TY - JOUR
T1 - Stealthiness Analysis of the Identified Model-Based Covert Attacks with Unknown Model
AU - Du, Dajun
AU - Zhang, Changda
AU - Zhang, Jin
AU - Sun, Qing
AU - Fei, Minrui
AU - Zhou, Huiyu
N1 - Publisher Copyright:
IEEE
PY - 2023
Y1 - 2023
N2 - Most of existing covert attacks are achieved based on known model, which is however impractical for the attacker, leading to the failure of covert attacks. To solve this problem, this paper presents a novel covert attacks method with unknown model. Firstly, the negative correlation between the model errors and the stealthiness of traditional covert attacks (TCAs) is quantitatively analyzed, where bigger errors brings worse stealthiness. Secondly, the subspace identification method is used to obtain the identified model of the plant. Furthermore, a novel identification and adaptive compensation based covert attacks (IACCAs) method is proposed, which can adaptively compensate the attack signals by adaptive law. Although there exist the identification errors, the stealthiness of IACCAs is proved to be similar as TCAs with known model. Finally, experimental results demonstrate the feasibility and effectiveness of the proposed IACCAs method, which can achieve covert attacks with unknown model.
AB - Most of existing covert attacks are achieved based on known model, which is however impractical for the attacker, leading to the failure of covert attacks. To solve this problem, this paper presents a novel covert attacks method with unknown model. Firstly, the negative correlation between the model errors and the stealthiness of traditional covert attacks (TCAs) is quantitatively analyzed, where bigger errors brings worse stealthiness. Secondly, the subspace identification method is used to obtain the identified model of the plant. Furthermore, a novel identification and adaptive compensation based covert attacks (IACCAs) method is proposed, which can adaptively compensate the attack signals by adaptive law. Although there exist the identification errors, the stealthiness of IACCAs is proved to be similar as TCAs with known model. Finally, experimental results demonstrate the feasibility and effectiveness of the proposed IACCAs method, which can achieve covert attacks with unknown model.
KW - Adaptation models
KW - Analytical models
KW - Control systems
KW - Covert attacks
KW - Cyberattack
KW - Denial-of-service attack
KW - Detectors
KW - Network systems
KW - adaptive compensation
KW - identification
KW - networked control systems
UR - http://www.scopus.com/inward/record.url?scp=85164713668&partnerID=8YFLogxK
U2 - 10.1109/TCNS.2023.3294431
DO - 10.1109/TCNS.2023.3294431
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85164713668
SN - 2325-5870
SP - 1
EP - 12
JO - IEEE Transactions on Control of Network Systems
JF - IEEE Transactions on Control of Network Systems
ER -