{"title":"网络攻击下CPS恶意预测","authors":"N. Bezzo","doi":"10.1109/ICCPS.2018.00049","DOIUrl":null,"url":null,"abstract":"Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Predicting Malicious Intention in CPS under Cyber-Attack\",\"authors\":\"N. Bezzo\",\"doi\":\"10.1109/ICCPS.2018.00049\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.\",\"PeriodicalId\":199062,\"journal\":{\"name\":\"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPS.2018.00049\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPS.2018.00049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Predicting Malicious Intention in CPS under Cyber-Attack
Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.