Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems

Yifa Liu;Long Cheng;Dan Ye
{"title":"Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems","authors":"Yifa Liu;Long Cheng;Dan Ye","doi":"10.1109/TICPS.2024.3446469","DOIUrl":null,"url":null,"abstract":"This article proposes an alternating false data injection attack strategy, which can bypass the summation detector in cyber-physical systems. This attack strategy offsets the impact on historical residuals by constantly changing the attack direction, and therefore invalidates the summation detector integrating historical information to detect the well-designed stealthy attacks. In the simulation, the proposed attack strategy reduces the increment of cumulative summation of residuals by 70% compared to the classical stealthy attack strategy, and bypasses both the \n<inline-formula><tex-math>$\\chi ^{2}$</tex-math></inline-formula>\n detector and the summation detector. Furthermore, from a more general perspective, by proposing an almost completely stealthy attack strategy to make the residual information almost unchanged, this article proves that residual based detection methods regardless of single-step residual based ones nor historical residual based ones cannot fully detect false data injection attacks.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"391-403"},"PeriodicalIF":0.0000,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10640291/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This article proposes an alternating false data injection attack strategy, which can bypass the summation detector in cyber-physical systems. This attack strategy offsets the impact on historical residuals by constantly changing the attack direction, and therefore invalidates the summation detector integrating historical information to detect the well-designed stealthy attacks. In the simulation, the proposed attack strategy reduces the increment of cumulative summation of residuals by 70% compared to the classical stealthy attack strategy, and bypasses both the $\chi ^{2}$ detector and the summation detector. Furthermore, from a more general perspective, by proposing an almost completely stealthy attack strategy to make the residual information almost unchanged, this article proves that residual based detection methods regardless of single-step residual based ones nor historical residual based ones cannot fully detect false data injection attacks.
针对网络物理系统中求和检测器的隐形虚假数据注入攻击
本文提出了一种交替虚假数据注入攻击策略,可以绕过网络物理系统中的求和检测器。这种攻击策略通过不断改变攻击方向来抵消对历史残差的影响,从而使整合历史信息的求和检测器无法检测到精心设计的隐形攻击。在仿真中,与经典的隐身攻击策略相比,所提出的攻击策略将残差累积求和的增量减少了 70%,并且绕过了 $\chi ^{2}$ 检测器和求和检测器。此外,从更广泛的角度来看,本文通过提出一种几乎完全隐蔽的攻击策略,使残差信息几乎保持不变,证明了基于残差的检测方法,无论是基于单步残差的检测方法,还是基于历史残差的检测方法,都无法完全检测出虚假数据注入攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信