Risk Assessment for Nonlinear Cyber-Physical Systems under Stealth Attacks (2405.02633v1)
Abstract: Stealth attacks pose potential risks to cyber-physical systems because they are difficult to detect. Assessing the risk of systems under stealth attacks remains an open challenge, especially in nonlinear systems. To comprehensively quantify these risks, we propose a framework that considers both the reachability of a system and the risk distribution of a scenario. We propose an algorithm to approximate the reachability of a nonlinear system under stealth attacks with a union of standard sets. Meanwhile, we present a method to construct a risk field to formally describe the risk distribution in a given scenario. The intersection relationships of system reachability and risk regions in the risk field indicate that attackers can cause corresponding risks without being detected. Based on this, we introduce a metric to dynamically quantify the risk. Compared to traditional methods, our framework predicts the risk value in an explainable way and provides early warnings for safety control. We demonstrate the effectiveness of our framework through a case study of an automated warehouse.
- Michael Henshaw. Research challenges and transatlantic collaboration on transportation cyber-physical systems. Transportation Cyber-Physical Systems, pages 247–265, 2018.
- Health-cps: Healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal, 11(1):88–95, 2015.
- Carsten Wittenberg. Human-cps interaction-requirements and human-machine interaction methods for the industry 4.0. IFAC-PapersOnLine, 49(19):420–425, 2016.
- Stuxnet and the future of cyber war. Survival, 53(1):23–40, 2011.
- Cyber threats impacting critical infrastructures. In Managing the Complexity of Critical Infrastructures, pages 139–161. Springer, Cham, 2016.
- A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 2018.
- A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Transactions on Smart Grid, 11(3):2218–2234, 2019.
- Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security, pages 355–366, 2011.
- Resiliency of nonlinear control systems to stealthy sensor attacks. In 2022 IEEE 61st Conference on Decision and Control (CDC), pages 7109–7114. IEEE, 2022.
- Stealthy integrity attacks for a class of nonlinear cyber-physical systems. IEEE Transactions on Automatic Control, 2021.
- A secure sensor fusion framework for connected and automated vehicles under sensor attacks. IEEE internet of things journal, 2022.
- The vulnerability of cyber-physical system under stealthy attacks. IEEE Transactions on Automatic Control, 66(2):637–650, 2020.
- Joint admittance perturbation and meter protection for mitigating stealthy fdi attacks against power system state estimation. IEEE Transactions on Power Systems, 35(2):1468–1478, 2019.
- Reachability-based safe learning with gaussian processes. In 53rd IEEE Conference on Decision and Control, pages 1424–1431. IEEE, 2014.
- André MH Teixeira. Optimal stealthy attacks on actuators for strictly proper systems. In 2019 IEEE 58th Conference on Decision and Control (CDC), pages 4385–4390. IEEE, 2019.
- Security metrics and synthesis of secure control systems. Automatica, 115:108757, 2020.
- Reachability analysis for safety assurance of cyber-physical systems against cyber attacks. IEEE Transactions on Automatic Control, 63(7):2272–2279, 2017.
- An lmi-based risk assessment of leader-follower multi-agent system under stealthy cyberattacks. IEEE Control Systems Letters, 2023.
- Improved interval estimation method for cyber-physical systems under stealthy deception attacks. IEEE Transactions on Signal and Information Processing over Networks, 8:1–11, 2021.
- Reachability analysis of cyber-physical systems under stealthy attacks. IEEE Transactions on Cybernetics, 52(6):4926–4934, 2022.
- A comparison of stealthy sensor attacks on control systems. In 2018 Annual American Control Conference (ACC), pages 973–979. IEEE, 2018.
- Reachability analysis for linear discrete-time systems under stealthy cyber attacks. IEEE Transactions on Automatic Control, 66(9):4444–4451, 2021.
- Iss method for coordination control of nonlinear dynamical agents under directed topology. IEEE transactions on cybernetics, 44(10):1832–1845, 2014.
- Safety and security risk assessment in cyber-physical systems. IET Cyber-Physical Systems: Theory & Applications, 4(3):221–232, 2019.
- Simo Sarkka. On unscented kalman filtering for state estimation of continuous-time nonlinear systems. IEEE Transactions on automatic control, 52(9):1631–1641, 2007.
- A method for simulating stable random variables. Journal of the american statistical association, 71(354):340–344, 1976.
- Matrix computations. JHU press, 2013.
- Double-state chi-square test based sparse grid quadrature filtering algorithm and its application in integrated navigation. IET Control Theory & Applications, 17(9):1203–1213, 2023.
- Unscented filtering and nonlinear estimation. Proceedings of the IEEE, 92(3):401–422, 2004.
- Taylor model flowpipe construction for non-linear hybrid systems. In 2012 IEEE 33rd Real-Time Systems Symposium, pages 183–192. IEEE, 2012.
- Introduction to interval analysis. SIAM, 2009.
- Xin Chen. Reachability analysis of non-linear hybrid systems using taylor models. PhD thesis, Fachgruppe Informatik, RWTH Aachen University, 2015.
- Methods for order reduction of zonotopes. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 5626–5633. IEEE, 2017.
- The assessment of risk caused by domino effect in quantitative area risk analysis. Journal of hazardous Materials, 127(1-3):14–30, 2005.
- A review of scenario analysis methods in planning and operation of modern power systems: Methodologies, applications, and challenges. Electric Power Systems Research, 205:107722, 2022.
- Scenario analysis, from bigdata to black swan. Computer Science Review, 28:131–139, 2018.
- Survey on scenario-based safety assessment of automated vehicles. IEEE Access, 8:87456–87477, 2020.
- Handling data uncertainties in event tree analysis. Process safety and environmental protection, 87(5):283–292, 2009.
- Hazard and operability (hazop) analysis. a literature review. Journal of hazardous materials, 173(1-3):19–32, 2010.
- Fmea: a model for reducing medical errors. Clinica chimica acta, 404(1):75–78, 2009.
- Contradictions identification of safety and security requirements for industrial cyber-physical systems. IEEE Internet of Things Journal, 2023.
- Zonotopes as bounding volumes. In SODA, volume 3, pages 803–812. Citeseer, 2003.
- A survey of motion planning and control techniques for self-driving urban vehicles. IEEE Transactions on intelligent vehicles, 1(1):33–55, 2016.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.