Cyber-attack detection based on controlled invariant sets
- 1 June 2014
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2014 European Control Conference (ECC)
- p. 2176-2181
- https://doi.org/10.1109/ecc.2014.6862206
Abstract
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology.Keywords
This publication has 13 references indexed in Scilit:
- Attack models and scenarios for networked control systemsPublished by Association for Computing Machinery (ACM) ,2012
- Distributed fault detection for interconnected second-order systemsAutomatica, 2011
- Cyber attack in a two-area power system: Impact identification using reachabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Safe and Secure Networked Control Systems under Denial-of-Service AttacksLecture Notes in Computer Science, 2009
- Reachability Analysis of Discrete-Time Systems With DisturbancesIEEE Transactions on Automatic Control, 2006
- On reachability and minimum cost optimal controlAutomatica, 2004
- Set invariance in controlAutomatica, 1999
- Infinite time reachability of state-space regions by using feedback controlIEEE Transactions on Automatic Control, 1972
- Control of linear dynamic systems with set constrained disturbancesIEEE Transactions on Automatic Control, 1971
- A minimax control problem for sampled linear systemsIEEE Transactions on Automatic Control, 1968