• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击

Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.

作者信息

Ren Xiu-Xiu, Yang Guang-Hong

出版信息

IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.

DOI:10.1109/TCYB.2021.3068220
PMID:33872173
Abstract

This article concentrates on designing optimal stealthy attack strategies for cyber-physical systems (CPSs) modeled by the linear quadratic Gaussian (LQG) dynamics, where the attacker aims to increase the quadratic cost maximally and keeping a certain level of stealthiness by simultaneously intercepting and modifying the transmitted measurements. In our work, a novel attack model is developed, based on which the attacker can launch strictly stealthy or ϵ -stealthy attacks. To remain strictly stealthy, the attacker only needs to solve an off-line semidefinite program problem. In such a case, the attack performance is optimal but limited. To achieve a higher desired attack effect than that of the strictly stealthy attack, the attacker sometimes needs to sacrifice the stealthy level. Thus, the ϵ -stealthy attack is analyzed, where an upper bound of the optimal attack performance is obtained by solving a convex optimization problem. Then, an optimal ϵ -stealthy attack is designed to achieve the upper bound, which differs from the existing suboptimal ϵ -stealthy attack for the considered LQG systems. Finally, the simulations are provided to verify the developed results.

摘要

本文专注于为以线性二次高斯(LQG)动力学建模的网络物理系统(CPS)设计最优的隐蔽攻击策略,在此模型中,攻击者旨在通过同时拦截和修改传输的测量值来最大程度地增加二次代价并保持一定程度的隐蔽性。在我们的工作中,开发了一种新颖的攻击模型,基于该模型攻击者可以发动严格隐蔽或ϵ -隐蔽攻击。为保持严格隐蔽,攻击者只需解决一个离线半定规划问题。在这种情况下,攻击性能是最优的但有限。为了实现比严格隐蔽攻击更高的期望攻击效果,攻击者有时需要牺牲隐蔽级别。因此,对ϵ -隐蔽攻击进行了分析,通过求解一个凸优化问题获得了最优攻击性能的上界。然后,设计了一种最优ϵ -隐蔽攻击以达到该上界,这与针对所考虑的LQG系统现有的次优ϵ -隐蔽攻击不同。最后,提供了仿真以验证所得到的结果。

相似文献

1
Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.基于库尔贝克-莱布勒散度的针对网络化线性二次高斯系统的最优隐蔽传感器攻击
IEEE Trans Cybern. 2022 Nov;52(11):11539-11548. doi: 10.1109/TCYB.2021.3068220. Epub 2022 Oct 17.
2
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.具有攻击成本的网络化线性二次高斯(LQG)系统中基于最优创新的隐秘攻击
IEEE Trans Cybern. 2024 Feb;54(2):787-796. doi: 10.1109/TCYB.2022.3229430. Epub 2024 Jan 17.
3
Optimal Stealthy Deception Attack Against Cyber-Physical Systems.最优隐身欺骗攻击对策的网络物理系统
IEEE Trans Cybern. 2020 Sep;50(9):3963-3972. doi: 10.1109/TCYB.2019.2912622. Epub 2019 May 8.
4
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
5
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.针对多传感器估计系统的具有资源约束的隐蔽虚假数据注入攻击。
ISA Trans. 2022 Aug;127:32-40. doi: 10.1016/j.isatra.2022.02.045. Epub 2022 Mar 4.
6
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.针对远程状态估计的能量受限最优隐秘攻击
IEEE Trans Cybern. 2024 Jun;54(6):3577-3587. doi: 10.1109/TCYB.2023.3312346. Epub 2024 May 30.
7
Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.网络物理系统的最优严格隐蔽攻击设计:一种数据驱动方法
IEEE Trans Cybern. 2024 Oct;54(10):6180-6192. doi: 10.1109/TCYB.2024.3413969. Epub 2024 Oct 9.
8
Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.针对配备攻击检测器的基于TCP/IP的网络控制系统的隐蔽攻击的数据驱动方法。
IEEE Trans Cybern. 2019 Aug;49(8):3020-3031. doi: 10.1109/TCYB.2018.2837874. Epub 2018 Jun 5.
9
Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.隐蔽攻击下信息物理系统的可达性分析
IEEE Trans Cybern. 2022 Jun;52(6):4926-4934. doi: 10.1109/TCYB.2020.3025307. Epub 2022 Jun 16.
10
False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.具有资源约束的网络物理系统的虚假数据注入攻击。
IEEE Trans Cybern. 2020 Feb;50(2):729-738. doi: 10.1109/TCYB.2018.2871951. Epub 2018 Oct 10.

引用本文的文献

1
Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.传感器和执行器环中的乘法攻击与对网络物理系统的基本隐身性。
Sensors (Basel). 2023 Feb 9;23(4):1957. doi: 10.3390/s23041957.
2
Privacy-Preserving Design of Scalar LQG Control.标量线性二次高斯(LQG)控制的隐私保护设计
Entropy (Basel). 2022 Jun 22;24(7):856. doi: 10.3390/e24070856.