DocumentCode
3743468
Title
Strategic stealthy attacks: The output-to-output ℓ2 -gain
Author
André Teixeira;Henrik Sandberg;Karl H. Johansson
Author_Institution
ACCESS Linnaeus Centre, KTH Royal Institute of Technology, Stockholm, Sweden
fYear
2015
Firstpage
2582
Lastpage
2587
Abstract
In this paper, we characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems. In particular, the threat scenarios tackled in the paper consider adversaries that aim at deteriorating the system´s performance by maximizing the corresponding quadratic cost function, while remaining stealthy with respect to anomaly detectors. As opposed to other work in the literature, the effect of the adversary´s actions on the anomaly detector´s output is not constrained to be zero at all times. Moreover, scenarios where the adversary has uncertain model knowledge are also addressed. The set of strategic attack policies is formulated as a non-convex constrained optimization problem, leading to a sensitivity metric denoted as the output-to-output ℓ2-gain. Using the framework of dissipative systems, the output-to-output gain is computed through an equivalent convex optimization problem. Additionally, we derive necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.
Keywords
"Detectors","Computational modeling","Control systems","Uncertainty","Computer security","Optimization"
Publisher
ieee
Conference_Titel
Decision and Control (CDC), 2015 IEEE 54th Annual Conference on
Type
conf
DOI
10.1109/CDC.2015.7402605
Filename
7402605
Link To Document