Optimization-based attack against control systems with CUSUM-based anomaly detection
(2022) 30th Mediterranean Conference on Control and Automation, MED 2022 In 2022 30th Mediterranean Conference on Control and Automation, MED 2022 p.896-901- Abstract
Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show... (More)
Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show that more dangerous attacks can be discovered when allowing saturation of the control system actuators. The proposed approach is compared with the geometric attack, showing how longer attack durations can lead to a greater impact of the attack while keeping the attack stealthy.
(Less)
- author
- Gualandi, Gabriele ; Maggio, Martina LU and Vittorio Papadopoulos, Alessandro LU
- publishing date
- 2022
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- 2022 30th Mediterranean Conference on Control and Automation, MED 2022
- series title
- 2022 30th Mediterranean Conference on Control and Automation, MED 2022
- pages
- 6 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 30th Mediterranean Conference on Control and Automation, MED 2022
- conference location
- Athens, Greece
- conference dates
- 2022-06-28 - 2022-07-01
- external identifiers
-
- scopus:85136286305
- ISBN
- 9781665406734
- DOI
- 10.1109/MED54222.2022.9837192
- language
- English
- LU publication?
- no
- additional info
- Publisher Copyright: © 2022 IEEE.
- id
- 1a164f8d-045c-475e-a0a8-18de647afe8d
- date added to LUP
- 2023-10-31 09:16:59
- date last changed
- 2023-11-16 15:45:08
@inproceedings{1a164f8d-045c-475e-a0a8-18de647afe8d, abstract = {{<p>Security attacks on sensor data can deceive a control system and force the physical plant to reach an unwanted and potentially dangerous state. Therefore, attack detection mechanisms are employed in cyber-physical control systems to detect ongoing attacks, the most prominent one being a threshold-based anomaly detection method called CUSUM. Literature defines the maximum impact of stealth attacks as the maximum deviation in the plant's state that an undetectable attack can introduce, and formulates it as an optimization problem. This paper proposes an optimization-based attack with different saturation models, and it investigates how the attack duration significantly affects the impact of the attack on the state of the plant. We show that more dangerous attacks can be discovered when allowing saturation of the control system actuators. The proposed approach is compared with the geometric attack, showing how longer attack durations can lead to a greater impact of the attack while keeping the attack stealthy.</p>}}, author = {{Gualandi, Gabriele and Maggio, Martina and Vittorio Papadopoulos, Alessandro}}, booktitle = {{2022 30th Mediterranean Conference on Control and Automation, MED 2022}}, isbn = {{9781665406734}}, language = {{eng}}, pages = {{896--901}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, series = {{2022 30th Mediterranean Conference on Control and Automation, MED 2022}}, title = {{Optimization-based attack against control systems with CUSUM-based anomaly detection}}, url = {{http://dx.doi.org/10.1109/MED54222.2022.9837192}}, doi = {{10.1109/MED54222.2022.9837192}}, year = {{2022}}, }