Security Analysis and Fault Detection Against Stealthy Replay Attacks

04/05/2020
by   Amirreza Zaman, et al.
0

This paper investigates the security issue of the data replay attacks on the control systems. The attacker is assumed to interfere with the control system process in a steady-state case. The problem is presented as the standard way to attack, which is storing measurements and replay ing them in further times to the system. The controller is assumed to be the LQG controller. The main novelty in this paper can be stated as proposing a different attack detection criterion by using the K-L divergence method to cover more general control system problems with these attacks and with higher-order dynamics. Also, there exists a packet-dropout feature in transmitting the data as another contribution of the paper. Formulations and numerical simulations prove the effectiveness of the newly proposed attack detection procedure by having a quick response to occurred attacks. Although, in previous approaches, the trade-off between attack detection delay or LQG performance was significant, in this approach it is proved that the difference in this trade-off is not considered in early moments when the attack happens since the attack detection rate is rapid and thus, these attacks can be stopped with defense strategies in the first moments with the proposed attack detection criterion.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/19/2021

Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks

MicroScope, and microarchitectural replay attacks in general, take advan...
research
03/18/2020

Detecting Replay Attacks Using Multi-Channel Audio: A Neural Network-Based Method

With the rapidly growing number of security-sensitive systems that use v...
research
12/19/2022

UAVCAN Dataset Description

We collected attack data from unmanned vehicles using the UAVCAN protoco...
research
09/04/2019

Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

In this paper, we introduce the concept of two-way coding, which origina...
research
04/27/2018

Attacks and Defenses in Mobile IP: Modeling with Stochastic Game Petri Net

The urging need for seamless connectivity in mobile environment has cont...
research
08/26/2019

Novel Stealthy Attack and Defense Strategies for Networked Control Systems

This paper studies novel attack and defense strategies, based on a class...
research
10/14/2019

Learning-based Intelligent Attack against Mobile Robots with Obstacle-avoidance

The security issue of mobile robots have attracted considerable attentio...

Please sign up or login with your details

Forgot password? Click here to reset