2021
DOI: 10.1109/tcns.2020.3028035
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Based Attacks in Cyber-Physical Systems

Abstract: We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical systems-the case of a discrete-time, linear, time-invariant plant that may be subject to an attack that overrides the sensor readings and the controller actions. The attacker attempts to learn the dynamics of the plant and subsequently overrides the controller's actuation signal, to destroy the plant without being detected. The attacker can feed fictitious sensor readings to the controller using its estimate of the pla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 60 publications
0
10
0
Order By: Relevance
“…Li et al [25] designed a two-loop covert attack on an industrial control system, using least squares support vector machines to construct a covert attack with an attack loop and a covert loop, and verified the effectiveness of the covert attack with a PLC system. Khojasteh et al [26] investigated a learning-based attack method to estimate the dynamics of a system through a nonlinear Gaussian process-based learning algorithm that attacked the control policy. Zhao et al [27] used subspace recognition technology to propose an attack method based on wrong data injection.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [25] designed a two-loop covert attack on an industrial control system, using least squares support vector machines to construct a covert attack with an attack loop and a covert loop, and verified the effectiveness of the covert attack with a PLC system. Khojasteh et al [26] investigated a learning-based attack method to estimate the dynamics of a system through a nonlinear Gaussian process-based learning algorithm that attacked the control policy. Zhao et al [27] used subspace recognition technology to propose an attack method based on wrong data injection.…”
Section: Related Workmentioning
confidence: 99%
“…(16) where Q, R, and G T +1 are positive definite matrices associated with state cost, input cost, and final cost respectively. The optimal control for this cost and resulting Riccati equation are given as in [8]…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…With the assumption of chi-square failure detection and perfect knowledge of a control system at the attacker, a sufficient and necessary condition for being perfectly attackable was provided [7]. When the attacker does not have full knowledge of the system, it may try to refine it through learning so that it can carry out more sophisticated attack [8]. The fundamental tradeoffs between the system performance and security were quantified through modeling a dynamical system with Markov decision process (MDP) which can be seen as partially observable MDP (POMDP) in the perspective of the attacker with limited access to the system [9].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations