A Comparison of Stealthy Sensor Attacks on Control Systems

dc.contributor.authorHashemi, Navid
dc.contributor.authorMurguia, C.
dc.contributor.authorRuths, Justin
dc.contributor.utdAuthorHashemi, Navid
dc.contributor.utdAuthorRuths, Justin
dc.date.accessioned2019-06-19T22:41:50Z
dc.date.available2019-06-19T22:41:50Z
dc.date.created2018-06
dc.descriptionFull text access from Treasures at UT Dallas is restricted to current UTD affiliates.
dc.description.abstractAs more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade detection. The term stealthy has come to encompass a variety of techniques that attackers can employ to avoid detection. Here we show how the states of the system (in particular, the reachable set corresponding to the attack) can be manipulated under two important types of stealthy attacks. We employ the chi-squared fault detection method and demonstrate how this imposes a constraint on the attack sequence either to generate no alarms (zero-alarm attack) or to generate alarms at a rate indistinguishable from normal operation (hidden attack).
dc.description.departmentErik Jonsson School of Engineering and Computer Science
dc.identifier.bibliographicCitationHashemi, N., C. Murguia, and J. Ruths. 2018. "A comparison of stealthy sensor attacks on control systems." Proceedings of the 2018 Annual American Control Conference: 973-979, doi:10.23919/ACC.2018.8431300
dc.identifier.isbn9781538654286
dc.identifier.issn0743-1619
dc.identifier.urihttps://hdl.handle.net/10735.1/6605
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.relation.isPartOfProceedings of the 2018 Annual American Control Conference
dc.relation.urihttp://dx.doi.org/10.23919/ACC.2018.8431300
dc.rights©2018 AACC.
dc.subjectDetectors
dc.subjectComputer networks—Monitoring
dc.subjectRandom variables
dc.subjectComputer security
dc.subjectHuman-machine systems
dc.titleA Comparison of Stealthy Sensor Attacks on Control Systems
dc.type.genrearticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
JECS-6604-279684.64-LINK.pdf
Size:
163.44 KB
Format:
Adobe Portable Document Format
Description:
Link to Article

Collections