Pregled bibliografske jedinice broj: 1132817
Maximization of Damage from a Non-Detected Cyber-Attack to a Control System with an Invariant-Set-Based Protection
Maximization of Damage from a Non-Detected Cyber-Attack to a Control System with an Invariant-Set-Based Protection // 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)
Kyoto, Japan: Institute of Electrical and Electronics Engineers (IEEE), 2021. str. 1-7 doi:10.1109/ISIE45552.2021.9576263 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1132817 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Maximization of Damage from a Non-Detected
Cyber-Attack to a Control System with an
Invariant-Set-Based Protection
Autori
Leko, Dorijan ; Vašak, Mario
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)
/ - : Institute of Electrical and Electronics Engineers (IEEE), 2021, 1-7
ISBN
978-1-7281-9023-5
Skup
30th IEEE International Symposium on Industrial Electronics
Mjesto i datum
Kyoto, Japan, 20.06.2021. - 23.06.2021
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
control system ; cyber-attack ; measurement distortion ; detection ; damage ; invariant set ; optimization
Sažetak
The paper elaborates a cyber-attack on a control system that is realized as a distortion of its feedback signal. The control system has an implemented detection of this type of cyber- attack by means of a minimum robust positively invariant set computed for the closed-loop control system for the case of bounded measurement noise. The work explores how to maximize the damage to the control system from the side of a well- informed attacker that tries to remain non- discovered by the implemented detection system. The information obtained through this analysis is crucial to assess the effectiveness of the analyzed detection system in suppressing potential damages of the considered cyber-attack type. It gives an insight into how large the damage can be in the worst case with the implemented protection scheme. A demonstration is performed on a simple double- integrator process and an important conclusion is that even the fully- informed attacker cannot perform significant damage while remaining below the radar of the invariant-set- based cyber-threat detection.
Izvorni jezik
Engleski
Znanstvena područja
Elektrotehnika, Računarstvo
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike i računarstva, Zagreb