This paper aims at modeling the optimal behavior for an attacker that has the objective to maliciously manipulate the output of an industrial power plant, which is fed via a public network to a digital twin in order to reconstruct the state. In particular, we consider a scenario where the attacker seeks a tradeoff between two conflicting objectives: dealing the maximum damage in terms of the norm of the estimation error for the observer and keeping the magnitude of the variation of the systems' output to a minimum. In doing so, we assume the observer is equipped with a bad data detector and the attacker must choose the injected signals in a way that guarantees that the bad data detection condition is not triggered. Copyright (c) 2022 The Authors. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)

Optimal Stealth Attacks to Cyber-Physical Systems: Seeking a Compromise between Maximum Damage and Effort

Faramondi, L;Oliva, G;Setola, R
2022-01-01

Abstract

This paper aims at modeling the optimal behavior for an attacker that has the objective to maliciously manipulate the output of an industrial power plant, which is fed via a public network to a digital twin in order to reconstruct the state. In particular, we consider a scenario where the attacker seeks a tradeoff between two conflicting objectives: dealing the maximum damage in terms of the norm of the estimation error for the observer and keeping the magnitude of the variation of the systems' output to a minimum. In doing so, we assume the observer is equipped with a bad data detector and the attacker must choose the injected signals in a way that guarantees that the bad data detection condition is not triggered. Copyright (c) 2022 The Authors. This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
2022
Cyber Attack; Cyber Security; Cyber-Physical Systems; Critical Infrastructures; Operational Technologies
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12610/73572
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? 1
social impact