Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 154 tok/s
Gemini 2.5 Pro 48 tok/s Pro
GPT-5 Medium 36 tok/s Pro
GPT-5 High 33 tok/s Pro
GPT-4o 70 tok/s Pro
Kimi K2 184 tok/s Pro
GPT OSS 120B 437 tok/s Pro
Claude Sonnet 4.5 36 tok/s Pro
2000 character limit reached

Attack Detector: Principles & Methods

Updated 9 November 2025
  • Attack detectors are systems that identify adversarial manipulations in networks and cyber-physical systems using control theory and machine learning.
  • They utilize dynamic windowed analyses and projection techniques to compare measured outputs with expected behavior for rapid anomaly detection.
  • Designs incorporate side initial state information to restrict undetectable attack spaces, ensuring timely and reliable detection of threats.

An attack detector is a system or algorithm designed to identify adversarial, malicious, or otherwise unauthorized manipulations within cyber-physical systems, computer networks, or machine learning models. In high-assurance domains, attack detectors serve as the last line of defense, operating under the assumption that other preventive controls may be bypassed. The design and evaluation of attack detectors is an active research area, integrating principles from control theory, statistics, machine learning, and formal security modeling. Modern attack detectors aim to address threats ranging from data-deception in CPS to malware dissemination and adversarial attacks on AI systems.

1. Fundamental Concepts and System Models

The canonical setting for attack detection in cyber-physical systems involves a discrete-time LTI (linear time-invariant) plant under data-deception, described by

x(k+1)=Ax(k)+Ba(k),      y(k)=Cx(k)+Da(k)x(k+1) = A x(k) + B a(k), \;\;\; y(k) = C x(k) + D a(k)

where x(k)Rnx(k)\in\mathbb{R}^n is the system state, y(k)Rpy(k)\in\mathbb{R}^p is the output, a(k)Rsa(k)\in\mathbb{R}^s is the adversarial input, and (A,B,C,D)(A,B,C,D) are plant and attack matrices. The attacker's objective is to modify output trajectories without being detected by an attack detector observing y(k)y(k) (and possibly some side initial state information). The global view is to distinguish between

  • Plant under attack: output/component statistics/frequency deviating due to a(k)0a(k)\neq 0
  • Plant under normal operation: a(k)=0a(k) = 0

The design of effective detectors requires formalizing attack models (e.g., false data injection, patch-based attacks, sensor/actuator manipulation), specifying the adversary's information and access, and defining what it means for an attack to be undetectable.

2. Undetectability, Weakly Unobservable Subspaces, and Side Information

A central result for dynamic attack detection is the characterization of undetectable attacks, particularly in the presence of side initial state information:

Given an attack sequence E(T)=[a(0)a(T)]E(T)=[a(0)^\top \ldots a(T)^\top]^\top, the output evolves as

Y(T)=OTx(0)+MTE(T)Y(T) = \mathcal{O}_T x(0) + \mathcal{M}_T E(T)

where OT=[C;CA;;CAT]\mathcal{O}_T=[C; CA; \ldots; CA^T] is the extended observability matrix and MT\mathcal{M}_T is the lower block-triangular input–output matrix.

If the detector has access to side information yΩ=Ωx(0)y_\Omega = \Omega x(0) (with ΩRq×n\Omega\in\mathbb{R}^{q\times n}), then an attack is undetectable if and only if there exists θN(Ω)V(Σ)\theta\in\mathcal{N}(\Omega)\cap\mathcal{V}(\Sigma) such that

MTE(T)=OTθ\mathcal{M}_T E(T) = -\mathcal{O}_T \theta

where the weakly unobservable subspace is

V(Σ)={θ:E(n1)  such that  Mn1E(n1)+On1θ=0}\mathcal{V}(\Sigma) = \left\{ \theta: \exists\,E(n-1)\;\text{such that}\; \mathcal{M}_{n-1}E(n-1)+\mathcal{O}_{n-1}\theta = 0 \right\}

This condition generalizes earlier results: with no side information (Ω=0\Omega=0), any θV(Σ)\theta\in\mathcal{V}(\Sigma) is admissible; with full knowledge (rankΩ=n\operatorname{rank}\Omega=n), only zero-state-inducing attacks (MTE(T)=0\mathcal{M}_T E(T) = 0) are undetectable.

Attacks that can maintain undetectability indefinitely (arbitrary-long horizon) also require that the attack-induced state evolution plus the undetectable component remains in V(Σ)\mathcal{V}(\Sigma) at all steps, i.e.,

CTE(T)+AT+1θV(Σ)\mathcal{C}_T E(T) + A^{T+1} \theta \in \mathcal{V}(\Sigma)

where CT\mathcal{C}_T is the controllability matrix.

3. Classes of Attack Detectors and Dynamic Detection Algorithms

Attack detectors are categorized by the information and statistical tests they use:

  • Static detectors, which compare instantaneous or time-aggregated measurements against thresholds or invariants.
  • Dynamic (windowed) detectors, which analyze measurements over finite time windows using system dynamics or projections.

A provably correct dynamic detector can be constructed as follows: given a measurement window of length ln+1l \ge n+1, the detector forms

Y(k)=[y(kl+1),,y(k)]\overline{Y}(k) = [y(k-l+1)^\top, \ldots, y(k)^\top]^\top

and,

Y^(k)={[yΩ,Y(l1)],k=l1 Y(k),kl\widehat{Y}(k) = \begin{cases} [y_\Omega^\top, \overline{Y}(l-1)^\top]^\top, & k=l-1 \ \overline{Y}(k), & k \ge l \end{cases}

H(k)={[Ω;Ol1],k=l1 Ol1,kl\mathcal{H}(k) = \begin{cases} [\Omega^\top; \mathcal{O}_{l-1}^\top ]^\top, & k=l-1 \ \mathcal{O}_{l-1}, & k \ge l \end{cases}

Let ΠH(k)\Pi_{\mathcal{H}(k)} denote the orthogonal projector onto RangeH(k)\operatorname{Range}\mathcal{H}(k). The attack detector declares "Attack" as soon as Y^(k)ΠH(k)Y^(k)\widehat{Y}(k)\neq \Pi_{\mathcal{H}(k)}\widehat{Y}(k). For window length ln+1l\ge n+1, this detector is both consistent (no false alarms) and sound (every detectable attack is declared within the window).

4. Specialized and Generalized Undetectable Attack Classes

A structurally critical class is the zero-state-inducing attack, defined by MTE(T)=0\mathcal{M}_T E(T)=0. Such attacks drive the system state but result in output sequences identical to the zero-state, and are completely undetectable even with side initial state information. These attacks exist for arbitrarily long horizons if and only if the intersection of the output-nulling reachable subspace W1\mathcal{W}_1 and the weakly unobservable subspace V(Σ)\mathcal{V}(\Sigma) is nontrivial.

In practical terms, zero-state-inducing attacks are the only ones that evade detection when the initial state is known exactly. Partial knowledge restricts the space of possible undetectable attacks depending on the kernel and image of Ω\Omega.

5. Impact of Detector Side Information

Availability of side information (linear functions of the initial state) alters the fundamental detectability boundaries. Even a single known coordinate (for instance, Ω=[1,0,,0]\Omega = [1, 0, \cdots, 0]) can render attacks detectable that would be perfectly stealthy in the classic system-without-side-information setting. Simulation evidence demonstrates that a windowed detector with side information can raise an alarm within three time steps for certain zero-dynamics attack scenarios, whereas the same detector with Ω=0\Omega=0 fails to detect such attacks at all.

This highlights the importance of initial state observability enhancements (e.g., through out-of-band monitoring) and their integration into dynamic attack detection architectures.

6. Simulation Results, Performance Guarantees, and Practical Deployment

Application to a linearized longitudinal model of a remotely piloted aircraft (n=4, p=3, actuator/sensor attack channels) demonstrates three key empirical findings:

  • A dynamic windowed detector with side information (Ω\Omega full rank or nontrivial) strictly outperforms the detector with no side information, achieving rapid, early detection of attacks otherwise perfectly stealthy.
  • Consistency (no false positives) and completeness (detection of all detectable attacks) are guaranteed for window sizes ln+1l\ge n+1.
  • The detector's computational demands are limited to linear algebraic operations (projection onto subspace), making real-time deployment tractable.

In summary, the combination of system-theoretic subspace analysis, explicit accounting for side initial state information, and projection-based dynamic windowed detection yields a comprehensive solution that characterizes all undetectable attack classes, enables provable security guarantees, and offers evidence for practical efficacy in simulation. This approach concretely delineates the roles of system structure, initial knowledge, and attack trajectory in the broader taxonomy of attack detectors in cyber-physical systems (Chen et al., 2015).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)
Forward Email Streamline Icon: https://streamlinehq.com

Follow Topic

Get notified by email when new papers are published related to Attack Detector.