2023
DOI: 10.1002/asjc.3238
|View full text |Cite
|
Sign up to set email alerts
|

The sensor‐actuators stealthy cyber‐attacks framework on networked control systems: A data‐driven approach

Liang Xin,
Biao Yang,
Zhiqing Long

Abstract: In this study, we address two fundamental questions that are crucial for designing stealthy cyber‐attacks similar to false data injection. The first question involves obtaining an accurate dynamic model of the target to ensure stealthy performance under a detector. The second question pertains to understanding the opponent's ongoing detection tactics, such as dynamic watermarking, and developing a counter‐strategy. To answer the first question, we propose a data‐driven framework that calculates the accurate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 32 publications
(58 reference statements)
0
0
0
Order By: Relevance
“…Nevertheless, it is worth noting that current research endeavors in the field of CPS security defense tend to focus on isolated facets, thereby neglecting a holistic and all-encompassing approach. In this paper, we examine a particular scenario in which a CPS with multiple sensors is susceptible to stealthy cyber attacks, including zero-dynamics attacks, covert attacks, and replay attacks [30]. To tackle this issue, we present a comprehensive framework for the process of security defense.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, it is worth noting that current research endeavors in the field of CPS security defense tend to focus on isolated facets, thereby neglecting a holistic and all-encompassing approach. In this paper, we examine a particular scenario in which a CPS with multiple sensors is susceptible to stealthy cyber attacks, including zero-dynamics attacks, covert attacks, and replay attacks [30]. To tackle this issue, we present a comprehensive framework for the process of security defense.…”
Section: Introductionmentioning
confidence: 99%