Cyber-attack detection based on controlled invariant sets

Abstract
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology.

This publication has 13 references indexed in Scilit: