3.8 Proceedings Paper

Maximization of Damage from a Non-Detected Cyber-Attack to a Control System with an Invariant-Set-Based Protection

Publisher

IEEE
DOI: 10.1109/ISIE45552.2021.9576263

Keywords

control system; cyber-attack; measurement distortion; detection; damage; invariant set; optimization

Funding

  1. European Union from the European Regional Development Fund via Operational Programme Competitiveness and Cohesion 2014-2020 for Croatia through the project Center of competencies for cyber-security of control systems (CEKOM SUS) [KK.01.2.2.03.0019]

Ask authors/readers for more resources

The paper discusses a cyber-attack on a control system realized through distorting its feedback signal, and introduces a method for detecting this type of attack. The study investigates the extent of damage to the control system caused by a well-informed attacker trying to remain undetected. A demonstration on a simple double-integrator process shows that the invariant-set-based cyber-threat detection system can prevent significant damage even from a fully-informed attacker.
The paper elaborates a cyber-attack on a control system that is realized as a distortion of its feedback signal. The control system has an implemented detection of this type of cyber-attack by means of a minimum robust positively invariant set computed for the closed-loop control system for the case of bounded measurement noise. The work explores how to maximize the damage to the control system from the side of a well-informed attacker that tries to remain non-discovered by the implemented detection system. The information obtained through this analysis is crucial to assess the effectiveness of the analyzed detection system in suppressing potential damages of the considered cyber-attack type. It gives an insight into how large the damage can be in the worst case with the implemented protection scheme. A demonstration is performed on a simple double-integrator process and an important conclusion is that even the fully-informed attacker cannot perform significant damage while remaining below the radar of the invariant-set-based cyber-threat detection.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available