{"title":"基于复杂动态网络编码策略的信息物理系统数据驱动隐身攻击检测","authors":"Jun-Lan Wang, Xiao-Jian Li","doi":"10.1002/rnc.7830","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>This article develops a novel data-driven stealthy attack detection strategy for a class of cyber-physical systems (CPSs) with external disturbances. First, it is proved that there exists a class of data-driven stealthy attacks designed by the subspace identification method, which cannot be detected by the existing detection protocols including the constant matrix-based encoding strategy. Then, in order to overcome this difficulty, the complex dynamical networks (CDNs) and the encoding/decoding technique are introduced to detect the data-driven stealthy attacks. In particular, the synchronization technique is adopted to ensure the consistency of the key sequences in encoding/decoding process, so that the encoded information on the decoder can be correctly recovered without attacks. In addition, the case of information leakage is analyzed, and it is demonstrated that the existing encoding detection strategy based on single node chaotic systems is ineffective, while the proposed one enhances the complexity of the encoding link and can still distinguish the stealthy attacks. In the end, simulations for the model of a DC motor system are performed to verify the effectiveness of the presented CDNs-based encoding detection scheme.</p>\n </div>","PeriodicalId":50291,"journal":{"name":"International Journal of Robust and Nonlinear Control","volume":"35 8","pages":"3154-3165"},"PeriodicalIF":3.2000,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data-Driven Stealthy Attacks Detection in Cyber-Physical Systems Based on Complex Dynamical Networks Encoding Strategy\",\"authors\":\"Jun-Lan Wang, Xiao-Jian Li\",\"doi\":\"10.1002/rnc.7830\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>This article develops a novel data-driven stealthy attack detection strategy for a class of cyber-physical systems (CPSs) with external disturbances. First, it is proved that there exists a class of data-driven stealthy attacks designed by the subspace identification method, which cannot be detected by the existing detection protocols including the constant matrix-based encoding strategy. Then, in order to overcome this difficulty, the complex dynamical networks (CDNs) and the encoding/decoding technique are introduced to detect the data-driven stealthy attacks. In particular, the synchronization technique is adopted to ensure the consistency of the key sequences in encoding/decoding process, so that the encoded information on the decoder can be correctly recovered without attacks. In addition, the case of information leakage is analyzed, and it is demonstrated that the existing encoding detection strategy based on single node chaotic systems is ineffective, while the proposed one enhances the complexity of the encoding link and can still distinguish the stealthy attacks. In the end, simulations for the model of a DC motor system are performed to verify the effectiveness of the presented CDNs-based encoding detection scheme.</p>\\n </div>\",\"PeriodicalId\":50291,\"journal\":{\"name\":\"International Journal of Robust and Nonlinear Control\",\"volume\":\"35 8\",\"pages\":\"3154-3165\"},\"PeriodicalIF\":3.2000,\"publicationDate\":\"2025-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Robust and Nonlinear Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/rnc.7830\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Robust and Nonlinear Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/rnc.7830","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Data-Driven Stealthy Attacks Detection in Cyber-Physical Systems Based on Complex Dynamical Networks Encoding Strategy
This article develops a novel data-driven stealthy attack detection strategy for a class of cyber-physical systems (CPSs) with external disturbances. First, it is proved that there exists a class of data-driven stealthy attacks designed by the subspace identification method, which cannot be detected by the existing detection protocols including the constant matrix-based encoding strategy. Then, in order to overcome this difficulty, the complex dynamical networks (CDNs) and the encoding/decoding technique are introduced to detect the data-driven stealthy attacks. In particular, the synchronization technique is adopted to ensure the consistency of the key sequences in encoding/decoding process, so that the encoded information on the decoder can be correctly recovered without attacks. In addition, the case of information leakage is analyzed, and it is demonstrated that the existing encoding detection strategy based on single node chaotic systems is ineffective, while the proposed one enhances the complexity of the encoding link and can still distinguish the stealthy attacks. In the end, simulations for the model of a DC motor system are performed to verify the effectiveness of the presented CDNs-based encoding detection scheme.
期刊介绍:
Papers that do not include an element of robust or nonlinear control and estimation theory will not be considered by the journal, and all papers will be expected to include significant novel content. The focus of the journal is on model based control design approaches rather than heuristic or rule based methods. Papers on neural networks will have to be of exceptional novelty to be considered for the journal.