4.8 Article

Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 15, 期 2, 页码 663-676

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2018.2819677

关键词

Covert attacks; data integrity (DI) attacks; industrial control systems (ICSs); programmable logic controllers (PLCs); support vector machines (SVMs)

资金

  1. National Key Research and Development Program [2016 YFB1001404]
  2. National Natural Science Foundation of China [61672093, 61432004]

向作者/读者索取更多资源

In the field of covert data integrity attacks, considerable attention has focused on two important issues. One is the issue of how to change the state of a plant, and the other is how to avoid being detected by anomaly detectors. A two-loop covert attack is presented to provide an integrated solution for these two issues. As an exploratory attempt to establish the feasibility of machine learning-based covert attacks, it applies the least squares support vector machine to constructing covert attacks. The proposed attack consists of an attack loop and a covert loop, which are based on an attack agent and a covert agent, respectively. The attack agent can move the steady state of a target plant to a desired state, and the covert agent can closely imitate the normal steady state of the plant to cover up the attack agent. In particular, the attack is directed to proportional-integral-derivative algorithms. Experiments are carried out to demonstrate the feasibility of the proposed attack and show the applicability of machine learning methods in constructing covert attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据