论文标题
探索控制执行的弹性跳过虚假数据注射攻击
Exploring The Resilience of Control Execution Skips against False Data Injection Attacks
论文作者
论文摘要
现代的网络物理系统(CPS)通常被设计为基于软件的控制器实现,这些实现很容易受到网络级别和物理水平攻击的影响。许多研究工作提出了CPS特定的攻击检测方案以及攻击弹性控制器设计的技术。但是,此类计划还会产生平台级别的开销。在这方面,一些最近的作品利用了在控制执行中使用跳过来增强CPS针对虚假数据注射(FDI)攻击的弹性。 在本文中,我们提供了一个分析讨论,涉及跳过控制执行能够提高系统对外国直接投资攻击的弹性,同时保持控制性能要求。我们还提出了一种合成此类最佳控制执行模式的方法。据我们所知,以前的工作都没有提供任何定量分析,该分析是对这种高度控制控制执行的攻击弹性和控制绩效之间的权衡。最后,我们在几个安全至关重要的CPS基准上评估了所提出的方法。
Modern Cyber-Physical Systems (CPSs) are often designed as networked, software-based controller implementations which have been found to be vulnerable to network-level and physical level attacks. A number of research works have proposed CPS-specific attack detection schemes as well as techniques for attack resilient controller design. However, such schemes also incur platform-level overheads. In this regard, some recent works have leveraged the use of skips in control execution to enhance the resilience of a CPS against false data injection (FDI) attacks. In this paper, we provide an analytical discussion on when and how skipping a control execution can improve the resilience of the system against FDI attacks while maintaining the control performance requirement. We also propose a methodology to synthesize such optimal control execution patterns. To the best of our knowledge, no previous work has provided any quantitative analysis about the trade-off between attack resilience and control performance for such aperiodic control execution. Finally, we evaluate the proposed method on several safety-critical CPS benchmarks.