On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in th...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on automatic control 2016-09, Vol.61 (9), p.2618-2624 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2624 |
---|---|
container_issue | 9 |
container_start_page | 2618 |
container_title | IEEE transactions on automatic control |
container_volume | 61 |
creator | Yilin Mo Sinopoli, Bruno |
description | This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus. |
doi_str_mv | 10.1109/TAC.2015.2498708 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1815183641</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7322210</ieee_id><sourcerecordid>4164715161</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</originalsourceid><addsrcrecordid>eNpdkE1LAzEQhoMoWKt3wUvAi5etSXazSY5l_SoUWmg9eArZdNZu3Y-apIf990ZaPHgaZnje4eVB6JaSCaVEPa6nxYQRyicsU1IQeYZGlHOZMM7SczQihMpEMZlfoivvd3HNs4yO0Meiw2ELeAmu6l1rOgv4CT6d2ZhQ9x3uK1wMJbhkuR18bU2DV4MP0Hr83m3A4VUA04TtgGddiLE6DHgagrFf_hpdVKbxcHOaY7R-eV4Xb8l88TorpvPEpiwLSWUtZyqWkYJLMIzkrFKsBLUpqzyVwmaMS2Y4sWUpqGJEloRwGjESzyodo4fj273rvw_gg25rb6FpTAf9wWsqU85zITIR0ft_6K4_uC6WixTlkcwzGilypKzrvXdQ6b2rW-MGTYn-Va2jav2rWp9Ux8jdMVIDwB8uUsYYJekPHiF4YA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1815183641</pqid></control><display><type>article</type><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Yilin Mo ; Sinopoli, Bruno</creator><creatorcontrib>Yilin Mo ; Sinopoli, Bruno</creatorcontrib><description>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</description><identifier>ISSN: 0018-9286</identifier><identifier>EISSN: 1558-2523</identifier><identifier>DOI: 10.1109/TAC.2015.2498708</identifier><identifier>CODEN: IETAA9</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Approximation methods ; Calculus ; Controllers ; Detectors ; Ellipsoids ; Failure analysis ; Integrity ; Linear systems ; Mathematical analysis ; Performance degradation ; Perturbation methods ; robustness ; SCADA systems ; security ; Sensor systems ; Yttrium</subject><ispartof>IEEE transactions on automatic control, 2016-09, Vol.61 (9), p.2618-2624</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</citedby><cites>FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</cites><orcidid>0000-0001-7937-6737</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7322210$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7322210$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yilin Mo</creatorcontrib><creatorcontrib>Sinopoli, Bruno</creatorcontrib><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><title>IEEE transactions on automatic control</title><addtitle>TAC</addtitle><description>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</description><subject>Approximation methods</subject><subject>Calculus</subject><subject>Controllers</subject><subject>Detectors</subject><subject>Ellipsoids</subject><subject>Failure analysis</subject><subject>Integrity</subject><subject>Linear systems</subject><subject>Mathematical analysis</subject><subject>Performance degradation</subject><subject>Perturbation methods</subject><subject>robustness</subject><subject>SCADA systems</subject><subject>security</subject><subject>Sensor systems</subject><subject>Yttrium</subject><issn>0018-9286</issn><issn>1558-2523</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1LAzEQhoMoWKt3wUvAi5etSXazSY5l_SoUWmg9eArZdNZu3Y-apIf990ZaPHgaZnje4eVB6JaSCaVEPa6nxYQRyicsU1IQeYZGlHOZMM7SczQihMpEMZlfoivvd3HNs4yO0Meiw2ELeAmu6l1rOgv4CT6d2ZhQ9x3uK1wMJbhkuR18bU2DV4MP0Hr83m3A4VUA04TtgGddiLE6DHgagrFf_hpdVKbxcHOaY7R-eV4Xb8l88TorpvPEpiwLSWUtZyqWkYJLMIzkrFKsBLUpqzyVwmaMS2Y4sWUpqGJEloRwGjESzyodo4fj273rvw_gg25rb6FpTAf9wWsqU85zITIR0ft_6K4_uC6WixTlkcwzGilypKzrvXdQ6b2rW-MGTYn-Va2jav2rWp9Ux8jdMVIDwB8uUsYYJekPHiF4YA</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Yilin Mo</creator><creator>Sinopoli, Bruno</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><orcidid>https://orcid.org/0000-0001-7937-6737</orcidid></search><sort><creationdate>201609</creationdate><title>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</title><author>Yilin Mo ; Sinopoli, Bruno</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-fcc5296448758ea2062f92be9dbf6387c42582a50cbb719208b0051062082a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Approximation methods</topic><topic>Calculus</topic><topic>Controllers</topic><topic>Detectors</topic><topic>Ellipsoids</topic><topic>Failure analysis</topic><topic>Integrity</topic><topic>Linear systems</topic><topic>Mathematical analysis</topic><topic>Performance degradation</topic><topic>Perturbation methods</topic><topic>robustness</topic><topic>SCADA systems</topic><topic>security</topic><topic>Sensor systems</topic><topic>Yttrium</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yilin Mo</creatorcontrib><creatorcontrib>Sinopoli, Bruno</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on automatic control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yilin Mo</au><au>Sinopoli, Bruno</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks</atitle><jtitle>IEEE transactions on automatic control</jtitle><stitle>TAC</stitle><date>2016-09</date><risdate>2016</risdate><volume>61</volume><issue>9</issue><spage>2618</spage><epage>2624</epage><pages>2618-2624</pages><issn>0018-9286</issn><eissn>1558-2523</eissn><coden>IETAA9</coden><abstract>This technical note analyzes the effect of stealthy integrity attacks on Cyber-Physical Systems, which is modeled as a Stochastic Linear Time-Invariant (LTI) system equipped with a linear filter, a linear feedback controller and a χ 2 failure detector. An attacker wishes to induce perturbation in the control loop by compromising a subset of the sensors and injecting an exogenous control input, without incurring detection from an anomaly detector. We show how the problem can be modeled, from the attacker's standpoint, as a constrained control problem and that the characterization of the maximum perturbation can be posed as reachable set computation, which we solve using ellipsoidal calculus.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TAC.2015.2498708</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0001-7937-6737</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9286 |
ispartof | IEEE transactions on automatic control, 2016-09, Vol.61 (9), p.2618-2624 |
issn | 0018-9286 1558-2523 |
language | eng |
recordid | cdi_proquest_journals_1815183641 |
source | IEEE Electronic Library (IEL) |
subjects | Approximation methods Calculus Controllers Detectors Ellipsoids Failure analysis Integrity Linear systems Mathematical analysis Performance degradation Perturbation methods robustness SCADA systems security Sensor systems Yttrium |
title | On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T17%3A00%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Performance%20Degradation%20of%20Cyber-Physical%20Systems%20Under%20Stealthy%20Integrity%20Attacks&rft.jtitle=IEEE%20transactions%20on%20automatic%20control&rft.au=Yilin%20Mo&rft.date=2016-09&rft.volume=61&rft.issue=9&rft.spage=2618&rft.epage=2624&rft.pages=2618-2624&rft.issn=0018-9286&rft.eissn=1558-2523&rft.coden=IETAA9&rft_id=info:doi/10.1109/TAC.2015.2498708&rft_dat=%3Cproquest_RIE%3E4164715161%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1815183641&rft_id=info:pmid/&rft_ieee_id=7322210&rfr_iscdi=true |