The problem of stealthy attacks for partially-observed discrete event systems is considered. An operator observes the plant through an observation mask that does not allow him to detect the occurrence of certain events (silent events). The observation is corrupted by an intruder who can insert and erase some sensor readings. We construct an attack structure A which guarantees that, when the plant reaches an unsafe state, A can make the operator think that the plant is in a safe state. Based on A, we can obtain a stealthy attack structure As by simply removing from A all the exposing states, all the weakly exposing states and their input and output arcs. The stealthy attack structure As only contains the possible attacks that can not be detected by the operator.

Stealthy Attacks for Partially-Observed Discrete Event Systems

Li, Zhiwu
;
Seatzu, Carla
Penultimo
;
Giua, Alessandro
Ultimo
2018-01-01

Abstract

The problem of stealthy attacks for partially-observed discrete event systems is considered. An operator observes the plant through an observation mask that does not allow him to detect the occurrence of certain events (silent events). The observation is corrupted by an intruder who can insert and erase some sensor readings. We construct an attack structure A which guarantees that, when the plant reaches an unsafe state, A can make the operator think that the plant is in a safe state. Based on A, we can obtain a stealthy attack structure As by simply removing from A all the exposing states, all the weakly exposing states and their input and output arcs. The stealthy attack structure As only contains the possible attacks that can not be detected by the operator.
2018
9781538671085
discrete event systems; intruder; stealthy attacks; Electrical and Electronic Engineering; Control and Systems Engineering; Industrial and Manufacturing Engineering; Computer Science Applications1707 Computer Vision and Pattern Recognition
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11584/259987
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 26
  • ???jsp.display-item.citation.isi??? 22
social impact