On the Computation of Worst Attacks: a LP Framework

We consider the problem of false data injection attacks modeled as additive disturbances in various parts of a general LTI feedback system and derive necessary and sufficient conditions for the existence of stealthy unbounded attacks. We also consider the problem of characterizing the worst, bounded and stealthy attacks. This problem involves a maximization of a convex function subject to convex constraints, and hence, in principle, it is not easy to solve. However, by employing a $\ell_{\infty}$ framework, we show how tractable Linear Programming (LP) methods can be used to obtain the worst attack design. Moreover, we provide a controller synthesis iterative method to minimize the worst impact of such attacks and test its efficacy in a power system component.

[1]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[2]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[3]  Jian Sun,et al.  Optimal data integrity attack on actuators in Cyber-Physical Systems , 2016, 2016 American Control Conference (ACC).

[4]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[5]  S. Liberty,et al.  Linear Systems , 2010, Scientific Parallel Computing.

[6]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[7]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[8]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[9]  Petros G. Voulgaris,et al.  Dual rate control for security in cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[10]  Weiyi Liu,et al.  Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems , 2014, J. Aerosp. Inf. Syst..

[11]  Emilio Frazzoli,et al.  Robust and resilient estimation for Cyber-Physical Systems under adversarial attacks , 2016, 2016 American Control Conference (ACC).

[12]  Mi-Ching Tsai,et al.  Robust and Optimal Control , 2014 .

[13]  Karl Henrik Johansson,et al.  Strategic stealthy attacks: The output-to-output ℓ2-gain , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[14]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[15]  Ruochi Zhang,et al.  Stealthy control signal attacks in vector LQG systems , 2016, 2016 American Control Conference (ACC).

[16]  Henrik Sandberg,et al.  Security analysis of control system anomaly detectors , 2017, 2017 American Control Conference (ACC).

[17]  Joao P. Hespanha,et al.  An H-infinity approach to stealth-resilient control design , 2016, 2016 Resilience Week (RWS).

[18]  M. Dahleh,et al.  Control of Uncertain Systems: A Linear Programming Approach , 1995 .