• DocumentCode
    3743468
  • Title

    Strategic stealthy attacks: The output-to-output ℓ2-gain

  • Author

    André Teixeira;Henrik Sandberg;Karl H. Johansson

  • Author_Institution
    ACCESS Linnaeus Centre, KTH Royal Institute of Technology, Stockholm, Sweden
  • fYear
    2015
  • Firstpage
    2582
  • Lastpage
    2587
  • Abstract
    In this paper, we characterize and analyze the set of strategic stealthy false-data injection attacks on discrete-time linear systems. In particular, the threat scenarios tackled in the paper consider adversaries that aim at deteriorating the system´s performance by maximizing the corresponding quadratic cost function, while remaining stealthy with respect to anomaly detectors. As opposed to other work in the literature, the effect of the adversary´s actions on the anomaly detector´s output is not constrained to be zero at all times. Moreover, scenarios where the adversary has uncertain model knowledge are also addressed. The set of strategic attack policies is formulated as a non-convex constrained optimization problem, leading to a sensitivity metric denoted as the output-to-output ℓ2-gain. Using the framework of dissipative systems, the output-to-output gain is computed through an equivalent convex optimization problem. Additionally, we derive necessary and sufficient conditions for the output-to-output gain to be unbounded, with and without model uncertainties, which are tightly related to the invariant zeros of the system.
  • Keywords
    "Detectors","Computational modeling","Control systems","Uncertainty","Computer security","Optimization"
  • Publisher
    ieee
  • Conference_Titel
    Decision and Control (CDC), 2015 IEEE 54th Annual Conference on
  • Type

    conf

  • DOI
    10.1109/CDC.2015.7402605
  • Filename
    7402605