Cyber attacks with bounded sensor reading edits for partially-observed discrete event systems

06/12/2019
by   Qi Zhang, et al.
0

The problem of cyber attacks with bounded sensor reading edits for partially-observed discrete event systems is considered. An operator observes a plant through an observation mask that does not allow him to detect the occurrence of certain events (silent events). The observation is corrupted by an attacker who can insert and erase some sensor readings. The operator observes the system evolution in order to validate if a state in a given set of unsafe states is reached. The attacker corrupts the observation with the aim of preventing the operator to verify when an interesting state has been reached. Furthermore, the attacker wants to remain stealthy, namely he wants the operator does not realize that someone is corrupting his observation. An automaton, called attack structure is proposed, which supports the attacker in defining an effective attack. In more detail, first, the unbounded attack structure is obtained by doing the concurrent composition of two state observers, the attacker observer and the operator observer. Then, the n-bounded attack structure, for a given integer value of n, is obtained by doing the concurrent composition of the unbounded attack structure and an n-bounded attack automaton. Finally, the n-bounded attack structure can be made supremal and stealthy by appropriately trimming the previous attack structure. A stealthy attacker can elaborate his strategy looking at the supremal stealthy attack substructure and may result in different degrees of effectiveness: strong, weak or vain. The proposed approach can be dually used to verify if such an attack could be effective for the given system, thus to establish if the system is safe under attack.

READ FULL TEXT
research
05/01/2020

A framework for the analysis of supervised discrete event systems under attack

This paper focuses on the problem of cyber attacks for discrete event sy...
research
11/02/2020

Error- and Tamper-Tolerant State Estimation for Discrete Event Systems under Cost Constraints

This paper deals with the state estimation problem in discrete-event sys...
research
09/17/2018

Authentication of cyber-physical systems under learning-based attacks

The problem of attacking and authenticating cyber-physical systems is co...
research
09/06/2020

On Decidability of Existence of Nonblocking Supervisors Resilient to Smart Sensor Attacks

Cybersecurity of discrete event systems (DES) has been gaining more and ...
research
11/03/2021

A unified concurrent-composition method to state/event inference and concealment in discrete-event systems

Discrete-event systems usually consist of discrete states and transition...
research
04/01/2021

Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

We consider the probabilistic planning problem where the agent (called P...
research
02/17/2020

Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack

The multi-armed bandit formalism has been extensively studied under vari...

Please sign up or login with your details

Forgot password? Click here to reset