Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems

Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems
Author :
Publisher :
Total Pages : 64
Release :
ISBN-10 : OCLC:1102320463
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems by : David B. Flamholz

Download or read book Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems written by David B. Flamholz and published by . This book was released on 2019 with total page 64 pages. Available in PDF, EPUB and Kindle. Book excerpt: The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility that was previously unavailable but also introduce communication channels that are vulnerable to outside interference and malicious intervention. This thesis considers the effects of a type of stealthy attack on a class of CPS that can be modeled as linear time-invariant systems. The effects of this attack are studied from both the perspective of the attacker as well as the defender. A previously developed method for conducting stealthy attacks is introduced and analyzed. This method consists of injecting malicious actuation signals into the control input of a CPS and then designing a sensor attack to conceal the effect of the actuator attack. The result is an attack that cannot be detected upon inspection of the Kalman filter residual. Successful implementation of this attack is shown to require the attacker to attain perfect model knowledge in order for the attack to be stealthy. Based on the execution of past attacks on CPS, this thesis proposes an attacker who starts their attack by "fishing" for critical and confidential system information such as the model parameters. A method is then proposed in which the defender attempts to feed the attacker a slightly falsified model, baiting the fishing attacker with data that will make an attack detectable. Because the attacker's model is no longer correct, their attack design will induce a mean-shift in the Kalman filter residual, breaking the stealthiness of the original attack formula. It is then shown that the defender can not only detect this faulty attack, but use observations of the Kalman filter residual to regain more accurate state estimates, mitigating the effect of the attack.


Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems Related Books

Baiting for Defense Against Stealthy Attacks on Cyber-physical Systems
Language: en
Pages: 64
Authors: David B. Flamholz
Categories:
Type: BOOK - Published: 2019 - Publisher:

DOWNLOAD EBOOK

The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near re
Resilience Engineering for Power and Communications Systems
Language: en
Pages: 509
Authors: Alexis Kwasinski
Categories: Science
Type: BOOK - Published: 2023-12-31 - Publisher: Cambridge University Press

DOWNLOAD EBOOK

Discover how and why power and communication networks fail in disasters, and explore strategies and technologies to stop future failures.
Vulnerability of Cyber-physical Systems to Optimal Stealthy Deterministic Attack Strategies
Language: en
Pages: 0
Authors: Ziyi Cheng
Categories: Cooperating objects (Computer systems)
Type: BOOK - Published: 2022 - Publisher:

DOWNLOAD EBOOK

Cyber-physical systems (CPSs) are an emerging technology with the potential to be transformational in the field of systems and control. They combine wireless an
The Impact of Zero-dynamics Stealthy Attacks on Control Systems
Language: en
Pages: 0
Authors: Stephanie Harshbarger
Categories:
Type: BOOK - Published: 2022 - Publisher:

DOWNLOAD EBOOK

Many critical infrastructures rely heavily on automated control systems, making them the target of cyber attacks. Vulnerabilities in control systems are especia
Stealthy Attacks and Defense Strategies in Competing Sensor Networks
Language: en
Pages:
Authors: Aleksandra Czarlinska
Categories:
Type: BOOK - Published: 2010 - Publisher:

DOWNLOAD EBOOK

The fundamental objective of sensor networks underpinning a variety of applications is the collection of reliable information from the surrounding environment.