Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Optimization-based attack against control systems with CUSUM-based anomaly detection

Gualandi, Gabriele ; Maggio, Martina LU and Vittorio Papadopoulos, Alessandro LU (2022) 30th Mediterranean Conference on Control and Automation, MED 2022 In 2022 30th Mediterranean Conference on Control and Automation, MED 2022 p.896-901
Abstract

Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show... (More)

Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show that more dangerous attacks can be discovered when allowing saturation of the control system actuators. The proposed approach is compared with the geometric attack, showing how longer attack durations can lead to a greater impact of the attack while keeping the attack stealthy.

(Less)
Please use this url to cite or link to this publication:
author
; and
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
host publication
2022 30th Mediterranean Conference on Control and Automation, MED 2022
series title
2022 30th Mediterranean Conference on Control and Automation, MED 2022
pages
6 pages
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
30th Mediterranean Conference on Control and Automation, MED 2022
conference location
Athens, Greece
conference dates
2022-06-28 - 2022-07-01
external identifiers
  • scopus:85136286305
ISBN
9781665406734
DOI
10.1109/MED54222.2022.9837192
language
English
LU publication?
no
additional info
Publisher Copyright: © 2022 IEEE.
id
1a164f8d-045c-475e-a0a8-18de647afe8d
date added to LUP
2023-10-31 09:16:59
date last changed
2023-11-16 15:45:08
@inproceedings{1a164f8d-045c-475e-a0a8-18de647afe8d,
  abstract     = {{<p>Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show that more dangerous attacks can be discovered when allowing saturation of the control system actuators. The proposed approach is compared with the geometric attack, showing how longer attack durations can lead to a greater impact of the attack while keeping the attack stealthy.</p>}},
  author       = {{Gualandi, Gabriele and Maggio, Martina and Vittorio Papadopoulos, Alessandro}},
  booktitle    = {{2022 30th Mediterranean Conference on Control and Automation, MED 2022}},
  isbn         = {{9781665406734}},
  language     = {{eng}},
  pages        = {{896--901}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  series       = {{2022 30th Mediterranean Conference on Control and Automation, MED 2022}},
  title        = {{Optimization-based attack against control systems with CUSUM-based anomaly detection}},
  url          = {{http://dx.doi.org/10.1109/MED54222.2022.9837192}},
  doi          = {{10.1109/MED54222.2022.9837192}},
  year         = {{2022}},
}