利用差分隐私机制对网络物理系统进行攻击隐藏。

IF 6.5
Jie Zhang, Yifan Dong, Li Yin, Zhiwu Li
{"title":"利用差分隐私机制对网络物理系统进行攻击隐藏。","authors":"Jie Zhang, Yifan Dong, Li Yin, Zhiwu Li","doi":"10.1016/j.isatra.2025.07.054","DOIUrl":null,"url":null,"abstract":"<p><p>A cyber-physical system in general consists of a physical process intertwined with computational elements supported by a communication network, sensors, and actuators, making such a system vulnerable to external attacks. This work, from the viewpoint of an attacker, considers cyberattack protection (concealment) of cyber-physical systems in the framework of discrete event systems modeled by finite automata such that the system operator cannot detect the attacks. In particular, different types of attacks (referred to as attack dictionaries) are applied to a cyber-physical system, potentially resulting in the corruption or alteration of the generated observations. By observing the output of the attacked system, the system operator may detect which specific attack dictionary has been imposed or utilized through state estimation. To prevent the attacks launched by an attacker from being detected, a mechanism, called state sequence differential privacy, is introduced to the observer of the attacked system. Suppose that two observations exist, where one of them allows for the detection of an attack type, while the other is randomly generated. A differential privacy mechanism is designed to disguise these two observations, ensuring that its modified output (exposed to the system operator) has an approximate probability with the two input observations. As a result, the attack dictionary cannot be detected by the system operator, even if the employed differential privacy mechanism is public. Finally, a case study is presented on the attack protection for a nuclear power facility, with a specific focus on the cyberattack incident at the Natanz nuclear power plant in Iran.</p>","PeriodicalId":94059,"journal":{"name":"ISA transactions","volume":" ","pages":""},"PeriodicalIF":6.5000,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack concealment for cyber-physical systems using a mechanism borrowing from differential privacy.\",\"authors\":\"Jie Zhang, Yifan Dong, Li Yin, Zhiwu Li\",\"doi\":\"10.1016/j.isatra.2025.07.054\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>A cyber-physical system in general consists of a physical process intertwined with computational elements supported by a communication network, sensors, and actuators, making such a system vulnerable to external attacks. This work, from the viewpoint of an attacker, considers cyberattack protection (concealment) of cyber-physical systems in the framework of discrete event systems modeled by finite automata such that the system operator cannot detect the attacks. In particular, different types of attacks (referred to as attack dictionaries) are applied to a cyber-physical system, potentially resulting in the corruption or alteration of the generated observations. By observing the output of the attacked system, the system operator may detect which specific attack dictionary has been imposed or utilized through state estimation. To prevent the attacks launched by an attacker from being detected, a mechanism, called state sequence differential privacy, is introduced to the observer of the attacked system. Suppose that two observations exist, where one of them allows for the detection of an attack type, while the other is randomly generated. A differential privacy mechanism is designed to disguise these two observations, ensuring that its modified output (exposed to the system operator) has an approximate probability with the two input observations. As a result, the attack dictionary cannot be detected by the system operator, even if the employed differential privacy mechanism is public. Finally, a case study is presented on the attack protection for a nuclear power facility, with a specific focus on the cyberattack incident at the Natanz nuclear power plant in Iran.</p>\",\"PeriodicalId\":94059,\"journal\":{\"name\":\"ISA transactions\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":6.5000,\"publicationDate\":\"2025-08-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISA transactions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1016/j.isatra.2025.07.054\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1016/j.isatra.2025.07.054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络物理系统通常由物理过程与通信网络、传感器和执行器支持的计算元素交织在一起,使这样的系统容易受到外部攻击。这项工作从攻击者的角度出发,考虑了由有限自动机建模的离散事件系统框架中网络物理系统的网络攻击保护(隐藏),使得系统操作员无法检测到攻击。特别是,不同类型的攻击(称为攻击字典)应用于网络物理系统,可能导致生成的观察结果的损坏或更改。通过观察被攻击系统的输出,系统操作员可以通过状态估计检测到哪个特定的攻击字典被施加或被利用。为了防止攻击者发起的攻击被检测到,向被攻击系统的观察者引入了一种称为状态序列差分隐私的机制。假设存在两个观测值,其中一个允许检测攻击类型,而另一个是随机生成的。差分隐私机制被设计用来掩盖这两个观察值,确保其修改后的输出(暴露给系统操作员)与两个输入观察值具有近似的概率。因此,即使所采用的差分隐私机制是公开的,系统操作员也无法检测到攻击字典。最后,介绍了一个关于核电设施攻击防护的案例研究,特别关注了伊朗纳坦兹核电站的网络攻击事件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Attack concealment for cyber-physical systems using a mechanism borrowing from differential privacy.

A cyber-physical system in general consists of a physical process intertwined with computational elements supported by a communication network, sensors, and actuators, making such a system vulnerable to external attacks. This work, from the viewpoint of an attacker, considers cyberattack protection (concealment) of cyber-physical systems in the framework of discrete event systems modeled by finite automata such that the system operator cannot detect the attacks. In particular, different types of attacks (referred to as attack dictionaries) are applied to a cyber-physical system, potentially resulting in the corruption or alteration of the generated observations. By observing the output of the attacked system, the system operator may detect which specific attack dictionary has been imposed or utilized through state estimation. To prevent the attacks launched by an attacker from being detected, a mechanism, called state sequence differential privacy, is introduced to the observer of the attacked system. Suppose that two observations exist, where one of them allows for the detection of an attack type, while the other is randomly generated. A differential privacy mechanism is designed to disguise these two observations, ensuring that its modified output (exposed to the system operator) has an approximate probability with the two input observations. As a result, the attack dictionary cannot be detected by the system operator, even if the employed differential privacy mechanism is public. Finally, a case study is presented on the attack protection for a nuclear power facility, with a specific focus on the cyberattack incident at the Natanz nuclear power plant in Iran.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信