2019
DOI: 10.1002/rnc.4666
|View full text |Cite
|
Sign up to set email alerts
|

Data‐based optimal Denial‐of‐Service attack scheduling against robust control based on Q‐learning

Abstract: Attack optimization is an important issue in securing cyber-physical systems. This paper investigates how an attacker should schedule its denial-of-service attacks to degrade the robust performance of a closed-loop system. The measurements of system states are transmitted to a remote controller over a multichannel network. With limited resources, the attacker only has the capacity to jam sparse channels and to decide which channels should be attacked. Under an  2 framework, a data-based optimal attack strateg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…The searches try to improve the previous works by using multi-channel support in [154]. Here the main objective of the jammer is to find the right channel before carrying out its attack.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The searches try to improve the previous works by using multi-channel support in [154]. Here the main objective of the jammer is to find the right channel before carrying out its attack.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
“…This process learns the jammer's strategy and obtains the optimal anti-jamming policy with little information about the attacker. An et al circumnavigate this countermeasure thanks to the Q-learning algorithm taking into account three types of different rewards: a) the NACK when the communication is public, b) the change of power, and c) the detection of users switching channels [154]. They test their attack into three environments: a) a fixed user, b) a frequency hopping user and c) an anti-jamming user.…”
Section: Smart Attacks Based On Behavioral Detectionmentioning
confidence: 99%
“…3,4 Therefore, how to curb cyber attacks has become an urgent issue. [5][6][7][8][9] As we all know, cyber attacks can be mainly classified into three categories: denial of service (DoS) attacks, 10,11 deception attacks, 12,13 and replay attacks. 14 For instance, a resilient dynamic event-triggered controller was designed to cope with the DoS attacks.…”
Section: Introductionmentioning
confidence: 99%