2016
DOI: 10.2514/1.i010388
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…Here, T is the length of the detector's time window, and c i for i = 1, ..., T are predefined non-negative coefficients, with c T being strictly positive. The above formulation captures both fixed window size detectors, where T is a constant, as well as detectors where the time window size T satisfies T = k. Also, the definition of the detection function g k covers a wide variety of commonly used intrusion detectors, such as χ 2 and sequential probability ratio test (SPRT) detectors previously considered in these scenarios [20], [18], [23], [19], [11], [12]. The alarm is triggered when the value of the detection function g k satisfies that g k > threshold, (7) and the probability of the alarm at time k can be captured as…”
Section: A System Model Without Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, T is the length of the detector's time window, and c i for i = 1, ..., T are predefined non-negative coefficients, with c T being strictly positive. The above formulation captures both fixed window size detectors, where T is a constant, as well as detectors where the time window size T satisfies T = k. Also, the definition of the detection function g k covers a wide variety of commonly used intrusion detectors, such as χ 2 and sequential probability ratio test (SPRT) detectors previously considered in these scenarios [20], [18], [23], [19], [11], [12]. The alarm is triggered when the value of the detection function g k satisfies that g k > threshold, (7) and the probability of the alarm at time k can be captured as…”
Section: A System Model Without Attacksmentioning
confidence: 99%
“…One line of work is based on the use of unknown input observers (e.g., [34], [27]) and non-convex optimization for resilient estimation (e.g., [4], [25]), while another focuses on attackdetection and estimation guarantees in systems with standard Kalman filter-based state estimators (e.g., [22], [21], [11], [12], [24], [23], [10]). In the later works, estimation residuebased failure detectors, such as χ 2 [22], [23] and sequential probability ratio test (SPRT) detectors [12], are employed for intrusion detection. Still, irrelevant of the utilized attack detection mechanism, after compromising a suitable subset of sensors, an intelligent attacker can significantly degrade control performance while remaining undetected (i.e., stealthy).…”
Section: Introductionmentioning
confidence: 99%
“…In feedback-control based CPS, the residue ( 6) is widely used for anomaly detection -χ 2 detector in (Y. Mo and B. Sinopoli, 2010;Mo & Sinopoli, 2015), cumulative sum in (Tunga et al, 2018), sequential probability ratio test (SPRT) detector in (Kwon et al, 2016), and a general window-type detector in (Jovanov & Pajic, 2019). For instance, with χ 2 -based detectors the detection function g t is a weighted norm of z t (with the χ 2 distribution) -i.e.,…”
Section: System Modelmentioning
confidence: 99%
“…Several procedures and techniques that analyze the residual for attack detection exist, one of which is the Sequential Probability Ratio Testing (SPRT) [8] that tests the sequence of incoming residuals one at a time by taking the loglikelihood function (LLF). The Cumulative Sum (CUSUM) procedure proposed in [9] and [10] leverages the known characteristics of the residual covariance and sequentially sums the residual error to find changes in mean of the distribution.…”
Section: A Related Workmentioning
confidence: 99%