Stealthy Attacks for Partially-Observed Discrete Event Systems

The problem of stealthy attacks for partially-observed discrete event systems is considered. An operator observes the plant through an observation mask that does not allow him to detect the occurrence of certain events (silent events). The observation is corrupted by an intruder who can insert and erase some sensor readings. We construct an attack structure $A$ which guarantees that, when the plant reaches an unsafe state, $A$ can make the operator think that the plant is in a safe state. Based on $A$, we can obtain a stealthy attack structure $A_{s}$ by simply removing from $A$ all the exposing states, all the weakly exposing states and their input and output arcs. The stealthy attack structure $A_{s}$ only contains the possible attacks that can not be detected by the operator.

[1]  Ilija Jovanov,et al.  Sporadic data integrity for secure state estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[2]  Stéphane Lafortune,et al.  Detection and prevention of actuator enablement attacks in supervisory control systems , 2016, 2016 13th International Workshop on Discrete Event Systems (WODES).

[3]  Santosh Biswas,et al.  Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack , 2019, IEEE/CAA Journal of Automatica Sinica.

[4]  Santosh Biswas,et al.  Application of stochastic discrete event system framework for detection of induced low rate TCP attack. , 2015, ISA transactions.

[5]  Jana Kosecka,et al.  Control of Discrete Event Systems , 1992 .

[6]  Christos G. Cassandras,et al.  Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.

[7]  Ping Zhang,et al.  Modeling and detection of cyber attacks on discrete event systems , 2018 .

[8]  Stéphane Lafortune,et al.  Stealthy deception attacks for cyber-physical systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[9]  D. Thorsley,et al.  Intrusion Detection in Controlled Discrete Event Systems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[10]  Alessandro Giua,et al.  Supervisory enforcement of current-state opacity with uncomparable observations , 2016, 2016 13th International Workshop on Discrete Event Systems (WODES).

[11]  Paulo Tabuada,et al.  Supervisory Control of Discrete-Event Systems Under Attacks , 2017, Dynamic Games and Applications.

[12]  Naren Ramakrishnan,et al.  Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths , 2015, CCS.

[13]  Marcos V. Moreira,et al.  Detectable and Undetectable Network Attack Security of Cyber-physical Systems , 2018 .

[14]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[15]  Rong Su,et al.  Supervisor Synthesis to Thwart Cyber Attack with Bounded Sensor Reading Alterations , 2016, Autom..