In this paper we propose an optimal Man-In-The-Middle attack strategy to maliciously manipulate information transmitted from the field to a centralized control unit. The aim of the attacker is to significantly deviate the system’s behavior from its nominal trajectory and, at the same time, avoid that thew attack can be recognized. Specifically, we consider a scenario where an attacker is able to intercept and manipulate data transmitted from a remote sensor to a centralized state estimator equipped with a bad data detector. As shown in the paper, under the assumption of perfect information, the attacker, by solving a non-concave maximization problem, can cause a large discrepancy between the actual state and the estimated one without being discovered. By developing local optimality conditions for the problem at hand, we are able to design an algorithm to find an approximated solution. The paper is concluded by an example showing the best strategy for the attacker.

Optimal Man-In-The-Middle Stealth Attack

Faramondi L.;Oliva G.;Setola R.
2021-01-01

Abstract

In this paper we propose an optimal Man-In-The-Middle attack strategy to maliciously manipulate information transmitted from the field to a centralized control unit. The aim of the attacker is to significantly deviate the system’s behavior from its nominal trajectory and, at the same time, avoid that thew attack can be recognized. Specifically, we consider a scenario where an attacker is able to intercept and manipulate data transmitted from a remote sensor to a centralized state estimator equipped with a bad data detector. As shown in the paper, under the assumption of perfect information, the attacker, by solving a non-concave maximization problem, can cause a large discrepancy between the actual state and the estimated one without being discovered. By developing local optimality conditions for the problem at hand, we are able to design an algorithm to find an approximated solution. The paper is concluded by an example showing the best strategy for the attacker.
2021
978-3-030-93199-5
978-3-030-93200-8
Critical infrastructures
Cyber attack
Cyber security
Cyber-physical systems
Operational technologies
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12610/65145
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact