S. Harshbarger, Mohsen Hosseinzadehtaher, Balaji Natarajan, Eugene Y. Vasserman, M. Shadmand, G. Amariucai
{"title":"无知是福:不完善的模型信息对电网隐形攻击的影响","authors":"S. Harshbarger, Mohsen Hosseinzadehtaher, Balaji Natarajan, Eugene Y. Vasserman, M. Shadmand, G. Amariucai","doi":"10.1109/KPEC47870.2020.9167599","DOIUrl":null,"url":null,"abstract":"Stealthy attacks on control systems have the potential to cause serious harm, as they are not readily detectable by any intrusion detection system. However, it is often the case that neither the controller nor the attacker can gather perfect information about the system model. We show that while a small mismatch between model and reality can easily be managed by a robust controller, an attacker's imperfect knowledge of the system can thwart the stealth of the attack. This opens the door to a whole new class of defense mechanisms, which focus on maximizing the attacker's uncertainty about the system while maintaining the controller's uncertainty within the bounds of its robustness. We demonstrate our findings on the simple quadruple tank control process and on a realistic power grid model, showing that the time to detect a stealthy attack depends on the attacker's level of uncertainty about the model.","PeriodicalId":308212,"journal":{"name":"2020 IEEE Kansas Power and Energy Conference (KPEC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"(A Little) Ignorance is Bliss: The Effect of Imperfect Model Information on Stealthy Attacks in Power Grids\",\"authors\":\"S. Harshbarger, Mohsen Hosseinzadehtaher, Balaji Natarajan, Eugene Y. Vasserman, M. Shadmand, G. Amariucai\",\"doi\":\"10.1109/KPEC47870.2020.9167599\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Stealthy attacks on control systems have the potential to cause serious harm, as they are not readily detectable by any intrusion detection system. However, it is often the case that neither the controller nor the attacker can gather perfect information about the system model. We show that while a small mismatch between model and reality can easily be managed by a robust controller, an attacker's imperfect knowledge of the system can thwart the stealth of the attack. This opens the door to a whole new class of defense mechanisms, which focus on maximizing the attacker's uncertainty about the system while maintaining the controller's uncertainty within the bounds of its robustness. We demonstrate our findings on the simple quadruple tank control process and on a realistic power grid model, showing that the time to detect a stealthy attack depends on the attacker's level of uncertainty about the model.\",\"PeriodicalId\":308212,\"journal\":{\"name\":\"2020 IEEE Kansas Power and Energy Conference (KPEC)\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE Kansas Power and Energy Conference (KPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/KPEC47870.2020.9167599\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Kansas Power and Energy Conference (KPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KPEC47870.2020.9167599","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
(A Little) Ignorance is Bliss: The Effect of Imperfect Model Information on Stealthy Attacks in Power Grids
Stealthy attacks on control systems have the potential to cause serious harm, as they are not readily detectable by any intrusion detection system. However, it is often the case that neither the controller nor the attacker can gather perfect information about the system model. We show that while a small mismatch between model and reality can easily be managed by a robust controller, an attacker's imperfect knowledge of the system can thwart the stealth of the attack. This opens the door to a whole new class of defense mechanisms, which focus on maximizing the attacker's uncertainty about the system while maintaining the controller's uncertainty within the bounds of its robustness. We demonstrate our findings on the simple quadruple tank control process and on a realistic power grid model, showing that the time to detect a stealthy attack depends on the attacker's level of uncertainty about the model.