2019 American Control Conference (ACC) 2019
DOI: 10.23919/acc.2019.8815318
|View full text |Cite
|
Sign up to set email alerts
|

Simulation and Real-World Evaluation of Attack Detection Schemes

Abstract: A variety of anomaly detection schemes have been proposed to detect malicious attacks to Cyber-Physical Systems. Among these schemes, Dynamic Watermarking methods have been proven highly effective at detecting a wide range of attacks. Unfortunately, in contrast to other anomaly detectors, no method has been presented to design a Dynamic Watermarking detector to achieve a user-specified false alarm rate, or subsequently evaluate the capabilities of an attacker under such a selection. This paper describes method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…SUch model was further generalized in [31] as an LTI system with partial state observations, and in [32] as a networked control system. Using dynamic watermarking to detect against attacks on sensors for real-world systems, such as robotics mobility platform [33], multi-vehicle transportation system testbed [34], and automatic power generation system [35] are also reported respectively.…”
Section: A Related Workmentioning
confidence: 99%
“…SUch model was further generalized in [31] as an LTI system with partial state observations, and in [32] as a networked control system. Using dynamic watermarking to detect against attacks on sensors for real-world systems, such as robotics mobility platform [33], multi-vehicle transportation system testbed [34], and automatic power generation system [35] are also reported respectively.…”
Section: A Related Workmentioning
confidence: 99%
“…This paper focuses on a particular detection method, Dynamic Watermarking, which adds a watermark signal to the control input to secure the measurement signals [4], [14]- [18]. Dynamic Watermarking is an active method meaning it makes alterations to the system which allow it to detect more complex attacks [19]- [21]. While, the specific methods of Dynamic Watermarking vary, in one popular approach the watermark is a multivariate Gaussian sequence that is generated by the controller.…”
Section: B Attack Detection Algorithmsmentioning
confidence: 99%
“…Although the controller with an integral action leads to a larger attack impact than a controller without an integral action both in our work as well as in (Urbina et al, 2016), we show that the integral action prevents the attack from being stealthy. Porter et al (2019) compare four different detectors with respect to their attack detection capability in simulation and real-world experiments. In the present work, we will only compare two of the four detectors in-vestigated in (Porter et al, 2019), but look at a more sophisticated attack strategy.…”
Section: Introductionmentioning
confidence: 99%
“…Porter et al (2019) compare four different detectors with respect to their attack detection capability in simulation and real-world experiments. In the present work, we will only compare two of the four detectors in-vestigated in (Porter et al, 2019), but look at a more sophisticated attack strategy. We also use a technique similar to the watermarking in (Porter et al, 2019) to achieve a detection of stealthy attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation