欺骗
计算机安全
计算机科学
信息物理系统
网络攻击
透视图(图形)
网络威胁
人工智能
心理学
社会心理学
操作系统
作者
Cheolhyeon Kwon,Weiyi Liu,Inseok Hwang
出处
期刊:American Control Conference
日期:2013-06-01
被引量:117
标识
DOI:10.1109/acc.2013.6580348
摘要
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is difficult to describe them systematically. In this paper, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Deception attacks (or false data injection attacks), which are performed by tampering with system components or data, are not of particular concern if they can be easily detected by the system's monitoring system. However, intelligent cyber attackers can avoid being detected by the monitoring system by carefully design cyber attacks. Our main objective is to investigate the performance of such stealthy deception attacks from the system's perspective. We investigate three kinds of stealthy deception attacks according to the attacker's ability to compromise the system. Based on the information about the dynamics of the system and existing hypothesis testing algorithms, we derive the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected. In the end, we illustrate the threat of these cyber attacks using an Unmanned Aerial Vehicle (UAV) navigation example.
科研通智能强力驱动
Strongly Powered by AbleSci AI