{"title":"针对网络物理系统的有限时间隐身隐蔽攻击","authors":"Kian Gheitasi, Walter Lucia","doi":"10.1109/CoDIT49905.2020.9263979","DOIUrl":null,"url":null,"abstract":"In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.","PeriodicalId":355781,"journal":{"name":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems\",\"authors\":\"Kian Gheitasi, Walter Lucia\",\"doi\":\"10.1109/CoDIT49905.2020.9263979\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.\",\"PeriodicalId\":355781,\"journal\":{\"name\":\"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)\",\"volume\":\"208 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CoDIT49905.2020.9263979\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CoDIT49905.2020.9263979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Finite-Time Stealthy Covert Attack Against Cyber-Physical Systems
In the last decade, several cyber-attacks against Cyber-Physical Systems (CPSs) have been investigated, and different active and passive control solutions have been proposed to assure the absence of undetectable attacks. In this paper, first, we show that most of the studied attacks, if performed for a finite-time duration, can be straightforwardly detected in the post-attack phase. Then, given a proper justification for the existence of finite-time attacks, we show that a finite-time stealthy covert attack can be performed if the attacker takes ad-hoc actions before terminating. We propose a practical implementation of a finite-time covert attack, obtained by combining a finite impulse response receding-horizon filter and reachability arguments. Finally, a simulation example, involving a quadruple-tanks water system, is shown to better clarify the capabilities of the designed attack.