On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems
On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems
Blog Article
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy attacks in cyber-physical systems, which are modeled as a stochastic linear time invariant (LTI) system equipped with a Kalman filter, an LQG controller, and a χ2 failure detector.The attacks are designed by a sophisticated attacker so that the measurement residual of the compromised system coincides with the healthy Spirulina one, and thus it is impossible to detect the attacks.First, we characterize and analyze an existence condition of the attacks from an attacker's standpoint.Then, we extend the attacks into Gimbal an attacker's goal: The scenario when the adversary wishes to manipulate the systems to an objective designed by him/her.Our results provide that the attacker can manipulate the compromised system to the objective without accessing the networks of real-time sensor or actuator data.
Finally, we verify the dangerousness of the attacks through a simple numerical example.