2017 IEEE Conference on Control Technology and Applications (CCTA) 2017
DOI: 10.1109/ccta.2017.8062639
|View full text |Cite
|
Sign up to set email alerts
|

Active detection for exposing intelligent attacks in control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Even though the replay attack is subtle in operation, it is still able to cause a crash if the platoon does not degrade control schemes. However, the level 3 controller appears resilient to the aggressive attack as illustrated in Figure 6 located in Appendix F. This is likely because the level 3 controller has a higher weighting on maintaining constant distance than velocity according to the controller gain in (40).…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Even though the replay attack is subtle in operation, it is still able to cause a crash if the platoon does not degrade control schemes. However, the level 3 controller appears resilient to the aggressive attack as illustrated in Figure 6 located in Appendix F. This is likely because the level 3 controller has a higher weighting on maintaining constant distance than velocity according to the controller gain in (40).…”
Section: Simulation Resultsmentioning
confidence: 99%
“…"Active" detection methods have been proposed to detect stealthy attacks. These methods involve the introduction of a probing signal (watermark) to reveal fake sensor measurement or actuation signals [21], [22]. Active methods can also be designed for attacks exploiting specific control-theoretic properties.…”
Section: Attack Detection In Icsmentioning
confidence: 99%
“…While passive detection techniques are effective against benign faults, bad data detectors can oftentimes be bypassed by powerful adversaries who leverage access to system channels and/or model knowledge to construct attacks so that the outputs received by a system operator are statistically consistent with expected output behavior. Since passive detection techniques provably fail in these instances, active detection techniques must be used to detect malicious attacks, where a defender intelligently changes the policy online by adding perturbations to the system [4], [5].…”
Section: A Detectionmentioning
confidence: 99%