On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks

This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on automatic control 2016-09, Vol.61 (9), p.2618-2624
Hauptverfasser: Yilin Mo, Sinopoli, Bruno
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2624
container_issue 9
container_start_page 2618
container_title IEEE transactions on automatic control
container_volume 61
creator Yilin Mo
Sinopoli, Bruno
description This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.
doi_str_mv 10.1109/TAC.2015.2498708
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1815183641</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7322210</ieee_id><sourcerecordid>4164715161</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoWKt3wUvAi5etSXazSY5l_SoUWmg9eArZdNZu3Y-apIf990ZaPHgaZnje4eVB6JaSCaVEPa6nxYQRyicsU1IQeYZGlHOZMM7SczQihMpEMZlfoivvd3HNs4yO0Meiw2ELeAmu6l1rOgv4CT6d2ZhQ9x3uK1wMJbhkuR18bU2DV4MP0Hr83m3A4VUA04TtgGddiLE6DHgagrFf_hpdVKbxcHOaY7R-eV4Xb8l88TorpvPEpiwLSWUtZyqWkYJLMIzkrFKsBLUpqzyVwmaMS2Y4sWUpqGJEloRwGjESzyodo4fj273rvw_gg25rb6FpTAf9wWsqU85zITIR0ft_6K4_uC6WixTlkcwzGilypKzrvXdQ6b2rW-MGTYn-Va2jav2rWp9Ux8jdMVIDwB8uUsYYJekPHiF4YA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1815183641</pqid></control><display><type>article</type><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Yilin Mo ; Sinopoli, Bruno</creator><creatorcontrib>Yilin Mo ; Sinopoli, Bruno</creatorcontrib><description>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</description><identifier>ISSN: 0018-9286</identifier><identifier>EISSN: 1558-2523</identifier><identifier>DOI: 10.1109/TAC.2015.2498708</identifier><identifier>CODEN: IETAA9</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Approximation methods ; Calculus ; Controllers ; Detectors ; Ellipsoids ; Failure analysis ; Integrity ; Linear systems ; Mathematical analysis ; Performance degradation ; Perturbation methods ; robustness ; SCADA systems ; security ; Sensor systems ; Yttrium</subject><ispartof>IEEE transactions on automatic control, 2016-09, Vol.61 (9), p.2618-2624</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</citedby><cites>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</cites><orcidid>0000-0001-7937-6737</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7322210$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7322210$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yilin Mo</creatorcontrib><creatorcontrib>Sinopoli, Bruno</creatorcontrib><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><title>IEEE transactions on automatic control</title><addtitle>TAC</addtitle><description>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</description><subject>Approximation methods</subject><subject>Calculus</subject><subject>Controllers</subject><subject>Detectors</subject><subject>Ellipsoids</subject><subject>Failure analysis</subject><subject>Integrity</subject><subject>Linear systems</subject><subject>Mathematical analysis</subject><subject>Performance degradation</subject><subject>Perturbation methods</subject><subject>robustness</subject><subject>SCADA systems</subject><subject>security</subject><subject>Sensor systems</subject><subject>Yttrium</subject><issn>0018-9286</issn><issn>1558-2523</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoWKt3wUvAi5etSXazSY5l_SoUWmg9eArZdNZu3Y-apIf990ZaPHgaZnje4eVB6JaSCaVEPa6nxYQRyicsU1IQeYZGlHOZMM7SczQihMpEMZlfoivvd3HNs4yO0Meiw2ELeAmu6l1rOgv4CT6d2ZhQ9x3uK1wMJbhkuR18bU2DV4MP0Hr83m3A4VUA04TtgGddiLE6DHgagrFf_hpdVKbxcHOaY7R-eV4Xb8l88TorpvPEpiwLSWUtZyqWkYJLMIzkrFKsBLUpqzyVwmaMS2Y4sWUpqGJEloRwGjESzyodo4fj273rvw_gg25rb6FpTAf9wWsqU85zITIR0ft_6K4_uC6WixTlkcwzGilypKzrvXdQ6b2rW-MGTYn-Va2jav2rWp9Ux8jdMVIDwB8uUsYYJekPHiF4YA</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Yilin Mo</creator><creator>Sinopoli, Bruno</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><orcidid>https://orcid.org/0000-0001-7937-6737</orcidid></search><sort><creationdate>201609</creationdate><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><author>Yilin Mo ; Sinopoli, Bruno</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Approximation methods</topic><topic>Calculus</topic><topic>Controllers</topic><topic>Detectors</topic><topic>Ellipsoids</topic><topic>Failure analysis</topic><topic>Integrity</topic><topic>Linear systems</topic><topic>Mathematical analysis</topic><topic>Performance degradation</topic><topic>Perturbation methods</topic><topic>robustness</topic><topic>SCADA systems</topic><topic>security</topic><topic>Sensor systems</topic><topic>Yttrium</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yilin Mo</creatorcontrib><creatorcontrib>Sinopoli, Bruno</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on automatic control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yilin Mo</au><au>Sinopoli, Bruno</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</atitle><jtitle>IEEE transactions on automatic control</jtitle><stitle>TAC</stitle><date>2016-09</date><risdate>2016</risdate><volume>61</volume><issue>9</issue><spage>2618</spage><epage>2624</epage><pages>2618-2624</pages><issn>0018-9286</issn><eissn>1558-2523</eissn><coden>IETAA9</coden><abstract>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TAC.2015.2498708</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0001-7937-6737</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9286
ispartof IEEE transactions on automatic control, 2016-09, Vol.61 (9), p.2618-2624
issn 0018-9286
1558-2523
language eng
recordid cdi_proquest_journals_1815183641
source IEEE Electronic Library (IEL)
subjects Approximation methods
Calculus
Controllers
Detectors
Ellipsoids
Failure analysis
Integrity
Linear systems
Mathematical analysis
Performance degradation
Perturbation methods
robustness
SCADA systems
security
Sensor systems
Yttrium
title On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T17%3A00%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Performance%20Degradation%20of%20Cyber-Physical%20Systems%20Under%20Stealthy%20Integrity%20Attacks&rft.jtitle=IEEE%20transactions%20on%20automatic%20control&rft.au=Yilin%20Mo&rft.date=2016-09&rft.volume=61&rft.issue=9&rft.spage=2618&rft.epage=2624&rft.pages=2618-2624&rft.issn=0018-9286&rft.eissn=1558-2523&rft.coden=IETAA9&rft_id=info:doi/10.1109/TAC.2015.2498708&rft_dat=%3Cproquest_RIE%3E4164715161%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1815183641&rft_id=info:pmid/&rft_ieee_id=7322210&rfr_iscdi=true