2019 American Control Conference (ACC) 2019
DOI: 10.23919/acc.2019.8815274
|View full text |Cite
|
Sign up to set email alerts
|

A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems

Abstract: Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communication patterns when compared to classical information technology networks. Because the structure of most CPS remains unchanged during long periods of time, they become vulnerable to adversaries who can tailor their attacks based on their precise knowledge of the system dynamics, communications, and control. Moving Target Defense (MTD) has emerged as a strategy to add uncertainty about the state and execution of a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…The dynamics is concealed to the adversary. Because it is time-varying, it becomes a moving target that is challenging to identify by an adversary, a precondition to the covert attack [7]. But, it is known to and used by the operator to detect the covert attack.…”
Section: ) Auxiliary Statesmentioning
confidence: 99%
“…The dynamics is concealed to the adversary. Because it is time-varying, it becomes a moving target that is challenging to identify by an adversary, a precondition to the covert attack [7]. But, it is known to and used by the operator to detect the covert attack.…”
Section: ) Auxiliary Statesmentioning
confidence: 99%
“…III.3 CPS-based MTD approaches -Most CPS-based MTD approaches have been proposed to control adversaries situated in the end devices, i.e., actuators and sensors. For example, in [11], authors propose a MTD strategy that randomly changes the availability of the sensor data, so that it is harder for adversaries to achieve stealthy attacks. This approach uses switched control systems that allow to detect sensor compromise and to minimize the impact of falsedata injection attacks.…”
Section: Iii1 Network Mtd Approaches -mentioning
confidence: 99%
“…As showed in recent surveys [7] [8] [9], most of the existing approaches require adding extra hardware [10], which may be expensive. Other solutions use detection approaches with recovery strategies [11] [12] [13] [14] that usually use state estimation to maintain an understanding of the system state under attack, even when a subset of inputs and outputs are compromised. These techniques work as traditional detection and mitigation approaches but do not provide resilience-by-design or prevent the execution of malicious commands.…”
Section: Introductionmentioning
confidence: 99%
“…An emerging approach to detect attacks and to limit their impact, which can combine both physical models and game theory, are moving target defense (MTD) strategies [6] that induce controlled uncertainties into the CPS to confuse the attacker. Gairo et al [7], for example, randomly switch between the sensors used to detect otherwise stealthy attacks, while in [8] a random watermarking signal is injected into the CPS to make stealthy attacks detectable. However, the MTD strategies in [7] and [8] directly influence the closed-loop behavior of the CPS and can decrease its performance.…”
Section: Introductionmentioning
confidence: 99%
“…Gairo et al [7], for example, randomly switch between the sensors used to detect otherwise stealthy attacks, while in [8] a random watermarking signal is injected into the CPS to make stealthy attacks detectable. However, the MTD strategies in [7] and [8] directly influence the closed-loop behavior of the CPS and can decrease its performance. Griffioen et al [9] propose a MTD scheme that introduces an auxiliary system to not influence the closed-loop behavior and simultaneously detect an attack.…”
Section: Introductionmentioning
confidence: 99%