An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

被引:108
作者
Cetinkaya, Ahmet [1 ]
Ishii, Hideaki [1 ]
Hayakawa, Tomohisa [2 ]
机构
[1] Tokyo Inst Technol, Dept Comp Sci, Yokohama, Kanagawa 2268502, Japan
[2] Tokyo Inst Technol, Dept Syst & Control Engn, Tokyo 1528552, Japan
关键词
networked control; cyber-security; denial-of-service; jamming attacks; probabilistic failure models; stability analysis; resilient control systems; multi-agent systems; NETWORKED CONTROL-SYSTEMS; CYBER-PHYSICAL SYSTEMS; DATA INJECTION ATTACKS; JAMMING INTERFERENCE; STATE ESTIMATION; DOS ATTACK; RESILIENT; STABILIZATION; SCHEDULE;
D O I
10.3390/e21020210
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols.
引用
收藏
页数:29
相关论文
共 98 条
[1]   Secure design for cloud control system against distributed denial of service attack [J].
Ali Y. ;
Xia Y. ;
Ma L. ;
Hammad A. .
Control Theory and Technology, 2018, 16 (01) :14-24
[2]  
Amin S, 2009, LECT NOTES COMPUT SC, V5469, P31, DOI 10.1007/978-3-642-00602-9_3
[3]   Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (03) :827-838
[4]  
Anantharamu L, 2011, LECT NOTES COMPUT SC, V6796, P89, DOI 10.1007/978-3-642-22212-2_9
[5]  
[Anonymous], 2001, Foundations of Modern Probability
[6]  
[Anonymous], 2010, Network Security: A Decision and Game-Theoretic Approach
[7]  
[Anonymous], IEEE CONTROL SYST MA
[8]  
Awerbuch B., 2002, P 1 ACM WORKSH WIR S, P21
[9]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[10]   JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH [J].
Bhattacharya, Sourabh ;
Gupta, Abhishek ;
Basar, Tamer .
NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION, 2013, 3 (01) :1-30