High-Confidence Attack Detection via Wasserstein-Metric Computations

This letter considers a sensor attack and fault detection problem for linear cyber-physical systems, which are subject to system noise that can obey an unknown light-tailed distribution. We propose a new threshold-based detection mechanism that employs the Wasserstein metric, and which guarantees system performance with high confidence with a finite number of measurements. The proposed detector may generate false alarms with a rate <inline-formula> <tex-math notation="LaTeX">$\Delta $ </tex-math></inline-formula> in normal operation, where <inline-formula> <tex-math notation="LaTeX">$\Delta $ </tex-math></inline-formula> can be tuned to be arbitrarily small by means of a <italic>benchmark distribution</italic>. Thus, the proposed detector is sensitive to sensor attacks and faults which have a statistical behavior that is different from that of the system noise. We quantify the impact of <italic>stealthy</italic> attacks on open-loop stable systems—which perturb the system operation while producing false alarms consistent with the natural system noise—via a <italic>probabilistic</italic> reachable set. Tractable implementation is enabled via a linear optimization to compute the detection measure and a semidefinite program to bound the reachable set.

[1]  A. Guillin,et al.  On the rate of convergence in Wasserstein distance of the empirical measure , 2013, 1312.2128.

[2]  Carlos Murguia,et al.  CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).

[3]  Karl Henrik Johansson,et al.  Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped With an Anomaly Detector , 2018, 2018 European Control Conference (ECC).

[4]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[5]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[6]  Tyler H. Summers,et al.  Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks** , 2019, 2020 American Control Conference (ACC).

[7]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[8]  Dragan Nesic,et al.  Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint) , 2018, ArXiv.

[9]  Filippo Santambrogio,et al.  Optimal Transport for Applied Mathematicians , 2015 .

[10]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[11]  Nathan van de Wouw,et al.  Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .

[12]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[13]  Jorge Cortés,et al.  Coverage Optimization and Spatial Load Balancing by Robotic Sensor Networks , 2010, IEEE Transactions on Automatic Control.

[14]  Francesco Bullo,et al.  Distributed Control of Robotic Networks , 2009 .

[15]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[16]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[17]  Phan Thanh Nam,et al.  Reachable Set Bounding for Linear Discrete-Time Systems with Delays and Bounded Disturbances , 2013, J. Optim. Theory Appl..

[18]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[19]  João Pedro Hespanha,et al.  Equivalent Characterizations of Input-to-State Stability for Stochastic Discrete-Time Systems , 2014, IEEE Transactions on Automatic Control.

[20]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[21]  Jos F. Sturm,et al.  A Matlab toolbox for optimization over symmetric cones , 1999 .

[22]  F. Santambrogio Optimal Transport for Applied Mathematicians: Calculus of Variations, PDEs, and Modeling , 2015 .

[23]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[24]  M. A. Athans,et al.  The role and use of the stochastic linear-quadratic-Gaussian problem in control system design , 1971 .