kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Estimating the impact of cyber-attack strategies for stochastic networked control systems
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0002-2045-5665
KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control). KTH, School of Electrical Engineering and Computer Science (EECS), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2020 (English)In: IEEE Transactions on Control of Network Systems, E-ISSN 2325-5870, Vol. 7, no 2, p. 747-757, article id 8827641Article in journal (Refereed) Published
Abstract [en]

Risk assessment is an inevitable step in implementation of a cyber-defense strategy. An important part of this assessment is to reason about the impact of possible attacks. In this paper, we study the problem of estimating the impact of cyber-attacks in stochastic linear networked control systems. For the stealthiness constraint, we adopt the Kullback-Leibler divergence between attacked and nonattacked residual sequences. Two impact metrics are considered: the probability that some of the critical states leave a safety region and the expected value of the infinity norm of the critical states. For the first metric, we prove that the optimal value of the impact estimation problem can be calculated by solving a set of convex problems. For the second, we derive efficiency to calculate lower and upper bounds. Finally, we show compatibility of our framework with a number of attack strategies proposed in the literature and demonstrate how it can be used for risk assessment in an example.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc. , 2020. Vol. 7, no 2, p. 747-757, article id 8827641
Keywords [en]
Cyber-physical systems, network security, networked control systems, risk analysis, security management, Accident prevention, Covariance matrix, Detectors, Estimation, Measurement, Risk assessment, Safety engineering, Stochastic systems, Attack strategies, Convex problems, Covariance matrices, Estimation problem, Expected values, IP networks, Kullback Leibler divergence, Lower and upper bounds
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-281237DOI: 10.1109/TCNS.2019.2940253ISI: 000549872800019Scopus ID: 2-s2.0-85072536001OAI: oai:DiVA.org:kth-281237DiVA, id: diva2:1467757
Note

QC 20200916

Available from: 2020-09-16 Created: 2020-09-16 Last updated: 2024-03-18Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Milosevic, JezdemirSandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
Milosevic, JezdemirSandberg, HenrikJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)ACCESS Linnaeus Centre
In the same journal
IEEE Transactions on Control of Network Systems
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 106 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf