• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

针对配备攻击检测器的基于TCP/IP的网络控制系统的隐蔽攻击的数据驱动方法。

Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.

作者信息

Wang Jun-Sheng, Yang Guang-Hong

出版信息

IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.

DOI:10.1109/TCYB.2018.2837874
PMID:29994347
Abstract

Most of the existing stealthy attack schemes for cyber-physical systems (CPSs) are presented under the assumption that the model parameters of CPS are known to attackers. Presently, there are only a few model-independent stealthy attack approaches, which, however, need the assumption that attackers know sensor measurements and can modify them. This paper aims to remove the aforementioned conservative assumptions and give a stealthy attack methodology for closed-loop CPS with reference signals, that is, transmission control protocol/Internet protocol (TCP/IP)-based networked control systems. To this end, under the condition that the model parameters of the CPS are unknown, a benchmark platform (consisting of an attack detector and a TCP/IP-based networked dc servo system) used for testing the stealthy attack technology is constructed via data-driven methods. A plan is made, which is utilized for eavesdropping the information of the TCP/IP-based CPS. On this basis, an approach to blocking network communications and injecting the false sensor data into the CPS is explored. A closed-loop recursive identification strategy for the dynamic characteristic matrix of the CPS is designed. By employing all of the above-obtained results, a data-driven stealthy attack scheme for the CPS is proposed and, subsequently, its effectiveness and practicability are validated by experiment.

摘要

大多数现有的针对网络物理系统(CPS)的隐蔽攻击方案都是在攻击者已知CPS模型参数的假设下提出的。目前,只有少数与模型无关的隐蔽攻击方法,然而,这些方法需要攻击者知道传感器测量值并能对其进行修改的假设。本文旨在消除上述保守假设,并为具有参考信号的闭环CPS给出一种隐蔽攻击方法,即基于传输控制协议/互联网协议(TCP/IP)的网络控制系统。为此,在CPS模型参数未知的情况下,通过数据驱动方法构建了一个用于测试隐蔽攻击技术的基准平台(由一个攻击检测器和一个基于TCP/IP的网络直流伺服系统组成)。制定了一个计划,用于窃听基于TCP/IP的CPS的信息。在此基础上,探索了一种阻断网络通信并将虚假传感器数据注入CPS的方法。设计了一种用于CPS动态特性矩阵的闭环递归辨识策略。利用上述所有结果,提出了一种针对CPS的数据驱动隐蔽攻击方案,随后通过实验验证了其有效性和实用性。

相似文献

1
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.针对配备攻击检测器的基于TCP/IP的网络控制系统的隐蔽攻击的数据驱动方法。
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.
2
Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.网络物理系统的最优严格隐蔽攻击设计:一种数据驱动方法
IEEE Trans Cybern. 2024 Oct;54(10):6180-6192. doi: 10.1109/TCYB.2024.3413969. Epub 2024 Oct 9.
3
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
4
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.具有攻击成本的网络化线性二次高斯(LQG)系统中基于最优创新的隐秘攻击
IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.
5
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
6
Event-triggering control scheme for discrete time Cyberphysical Systems in the presence of simultaneous hybrid stochastic attacks.存在同时混合随机攻击情况下离散时间信息物理系统的事件触发控制方案。
ISA Trans. 2022 Mar;122:1-12. doi: 10.1016/j.isatra.2021.04.027. Epub 2021 Apr 27.
7
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
8
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.针对一类频域受限传感器和执行器攻击的信息物理系统可靠控制策略。
IEEE Trans Cybern. 2018 Dec;48(12):3432-3439. doi: 10.1109/TCYB.2018.2815758. Epub 2018 Mar 27.
9
A Novel Cyber Attack Detection Method in Networked Control Systems.一种网络控制系统中的新型网络攻击检测方法。
IEEE Trans Cybern. 2018 Nov;48(11):3254-3264. doi: 10.1109/TCYB.2018.2843358. Epub 2018 Jun 26.
10
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.针对远程状态估计系统的基于事件的最优隐蔽虚假数据注入攻击
IEEE Trans Cybern. 2023 Oct;53(10):6714-6724. doi: 10.1109/TCYB.2023.3255583. Epub 2023 Sep 15.

引用本文的文献

1
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.