Q-learning Based Optimal False Data Injection Attack on Probabilistic Boolean Control Networks
Abstract: In this paper, we present a reinforcement learning (RL) method for solving optimal false data injection attack problems in probabilistic Boolean control networks (PBCNs) where the attacker lacks knowledge of the system model. Specifically, we employ a Q-learning (QL) algorithm to address this problem. We then propose an improved QL algorithm that not only enhances learning efficiency but also obtains optimal attack strategies for large-scale PBCNs that the standard QL algorithm cannot handle. Finally, we verify the effectiveness of our proposed approach by considering two attacked PBCNs, including a 10-node network and a 28-node network.
- S. Kauffman, “Metabolic stability and epigenesis in randomly constructed genetic nets,” J. Theoret. Biol., vol. 22, no. 3, pp. 437–467, 1969.
- M. Meng, J. Lam, J. Feng, and K. Cheung, “Stability and stabilization of Boolean networks with stochastic delays,” IEEE Trans. Autom. Control, vol. 64, no. 2, pp. 790–796, 2019.
- H. Li, X. Yang, and S. Wang, “Robustness for stability and stabilization of Boolean networks with stochastic function perturbations,” IEEE Trans. Automat. Control, vol. 66, no. 3, pp. 1231–1237, 2021.
- M. Imani, E. R. Dougherty, and U. Braga-Neto, “Boolean Kalman filter and smoother under model uncertainty,” Automatica, vol. 111, p. 108609, 2020.
- J. Heidel, J. Maloney, C. Farrow, and J. Rogers, “Finding cycles in synchronous Boolean networks with applications to biochemical systems,” Internat. J. Bifur. Chaos, vol. 13, no. 3, pp. 535–552, 2003.
- Y. Guo, P. Wang, W. Gui, and C. Yang, “Set stability and set stabilization of boolean control networks based on invariant subsets,” Automatica, vol. 61, pp. 106–112, 2015.
- I. Shmulevich, E. Dougherty, S. Kim, and W. Zhang, “Probabilistic Boolean networks: a rule-based uncertainty model for gene regulatory networks,” Bioinformatics, vol. 18, no. 2, pp. 261–274, 2002.
- Z. Ma, Z. J. Wang, and M. J. McKeown, “Probabilistic Boolean network analysis of brain connectivity in parkinson’s disease,” IEEE Journal of selected topics in signal processing, vol. 2, no. 6, pp. 975–985, 2008.
- P. J. Rivera Torres, E. I. Serrano Mercado, and L. Anido Rifón, “Probabilistic Boolean network modeling and model checking as an approach for DFMEA for manufacturing systems,” Journal of Intelligent Manufacturing, vol. 29, no. 6, pp. 1393–1413, 2018.
- P. Trairatphisan, A. Mizera, J. Pang, A. A. Tantar, J. Schneider, and T. Sauter, “Recent development and biomedical applications of probabilistic Boolean networks,” Cell communication and signaling, vol. 11, no. 1, pp. 1–25, 2013.
- J.-W. Gu, W.-K. Ching, T.-K. Siu, and H. Zheng, “On modeling credit defaults: A probabilistic Boolean network approach,” Risk and Decision Analysis, vol. 4, no. 2, pp. 119–129, 2013.
- P. J. Rivera Torres, E. I. Serrano Mercado, and L. Anido Rifón, “Probabilistic Boolean network modeling of an industrial machine,” Journal of Intelligent Manufacturing, vol. 29, no. 4, pp. 875–890, 2018.
- C. Yang, J. Wu, X. Ren, W. Yang, H. Shi, and L. Shi, “Deterministic sensor selection for centralized state estimation under limited communication resource,” IEEE Trans. Signal Process., vol. 63, no. 9, pp. 2336–2348, 2015.
- S. H. Ahmed, G. Kim, and D. Kim, “Cyber physical system: Architecture, applications and research challenges,” in 2013 IFIP Wireless Days (WD), pp. 1–5, 2013.
- Y. Tang, D. Zhang, D. W. C. Ho, and F. Qian, “Tracking control of a class of cyber-physical systems via a flexray communication network,” IEEE Trans. Cybernetics, vol. 49, no. 4, pp. 1186–1199, 2019.
- A. Roli, M. Manfroni, C. Pinciroli, and M. Birattari, “On the design of Boolean network robots,” in European Conference on the Applications of Evolutionary Computation, pp. 43–52, 2011.
- J. Zhang, J. Sun, and H. Lin, “Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol,” Automatica, vol. 127, p. 109517, 2021.
- J. Markoff, “A silent attack, but not a subtle one,” The New York Times, Sept. 26, 2010.
- T. Sui and X. Sun, “The vulnerability of distributed state estimator under stealthy attacks,” Automatica, vol. 133, p. 109869, 2021.
- H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal Denial-of-Service attack scheduling with energy constraint,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023–3028, 2015.
- B. Chen, D. W. C. Ho, G. Hu, and L. Yu, “Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks,” IEEE Trans. Cybernetics, vol. 48, no. 6, pp. 1862–1876, 2018.
- Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” in 16th ACM Conference on Computer and Communications Security, pp. 21–32, 2009.
- Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks on SCADA systems,” IEEE Transactions on Control Systems Technology, vol. 22, no. 4, pp. 1396–1407, 2013.
- W. Yang, Y. Zhang, G. Chen, C. Yang, and L. Shi, “Distributed filtering under false data injection attacks,” Automatica, vol. 102, pp. 34–44, 2019.
- R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction. MIT press, 2018.
- L. Buşoniu, T. de Bruin, D. Tolić, J. Kober, and I. Palunko, “Reinforcement learning for control: Performance, stability, and deep approximators,” Annual Reviews in Control, vol. 46, pp. 8–28, 2018.
- S. Preitl, R.-E. Precup, Z. Preitl, S. Vaivoda, S. Kilyeni, and J. K. Tar, “Iterative feedback and learning control. servo systems applications,” IFAC Proceedings Volumes, vol. 40, no. 8, pp. 16–27, 2007.
- R.-C. Roman, R.-E. Precup, and E. M. Petriu, “Hybrid data-driven fuzzy active disturbance rejection control for tower crane systems,” European Journal of Control, vol. 58, pp. 373–387, 2021.
- C. J. C. H. Watkins, Learning from delayed rewards. Ph.d. thesis, King’s College, Cambridge United Kingdom, 1989.
- Z. Liu, J. Zhong, Y. Liu, and W. Gui, “Weak stabilization of Boolean networks under state-flipped control,” IEEE Transactions on Neural Networks and Learning Systems, vol. published online, 2021.
- P. B. Dimitri et al., “Dynamic programming and optimal control,” Athena Scientific, vol. 1-2, 1995.
- C. J. Watkins and P. Dayan, “Q-learning,” Machine learning, vol. 8, no. 3, pp. 279–292, 1992.
- A. Veliz-Cuba and B. Stigler, “Boolean models can explain bistability in the lac operon,” Journal of computational biology, vol. 18, no. 6, pp. 783–794, 2011.
- A. Acernese, A. Yerudkar, L. Glielmo, and C. Del Vecchio, “Double deep-q learning-based output tracking of probabilistic boolean control networks,” IEEE Access, vol. 8, pp. 199254–199265, 2020.
- K. Zhang and K. H. Johansson, “Efficient verification of observability and reconstructibility for large Boolean control networks with special structures,” IEEE Transactions on Automatic Control, vol. 65, no. 12, pp. 5144–5158, 2020.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.