Baiting for defense against stealthy attacks on cyber-physical systems

Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019 === Cataloged from PDF version of thesis. === Includes bibliographical references (pages 63-64). === The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which...

Full description

Bibliographic Details
Main Author: Flamholz, David B.
Other Authors: Anuradha M. Annaswamy.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2019
Subjects:
Online Access:https://hdl.handle.net/1721.1/121858
id ndltd-MIT-oai-dspace.mit.edu-1721.1-121858
record_format oai_dc
spelling ndltd-MIT-oai-dspace.mit.edu-1721.1-1218582019-09-16T15:13:06Z Baiting for defense against stealthy attacks on cyber-physical systems Flamholz, David B. Anuradha M. Annaswamy. Massachusetts Institute of Technology. Department of Mechanical Engineering. Massachusetts Institute of Technology. Department of Mechanical Engineering Mechanical Engineering. Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019 Cataloged from PDF version of thesis. Includes bibliographical references (pages 63-64). The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility that was previously unavailable but also introduce communication channels that are vulnerable to outside interference and malicious intervention. This thesis considers the effects of a type of stealthy attack on a class of CPS that can be modeled as linear time-invariant systems. The effects of this attack are studied from both the perspective of the attacker as well as the defender. A previously developed method for conducting stealthy attacks is introduced and analyzed. This method consists of injecting malicious actuation signals into the control input of a CPS and then designing a sensor attack to conceal the effect of the actuator attack. The result is an attack that cannot be detected upon inspection of the Kalman filter residual. Successful implementation of this attack is shown to require the attacker to attain perfect model knowledge in order for the attack to be stealthy. Based on the execution of past attacks on CPS, this thesis proposes an attacker who starts their attack by "fishing" for critical and confidential system information such as the model parameters. A method is then proposed in which the defender attempts to feed the attacker a slightly falsified model, baiting the fishing attacker with data that will make an attack detectable. Because the attacker's model is no longer correct, their attack design will induce a mean-shift in the Kalman filter residual, breaking the stealthiness of the original attack formula. It is then shown that the defender can not only detect this faulty attack, but use observations of the Kalman filter residual to regain more accurate state estimates, mitigating the effect of the attack. by David B. Flamholz. S.M. S.M. Massachusetts Institute of Technology, Department of Mechanical Engineering 2019-07-19T19:50:39Z 2019-07-19T19:50:39Z 2019 2019 Thesis https://hdl.handle.net/1721.1/121858 1102320463 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 64 pages application/pdf Massachusetts Institute of Technology
collection NDLTD
language English
format Others
sources NDLTD
topic Mechanical Engineering.
spellingShingle Mechanical Engineering.
Flamholz, David B.
Baiting for defense against stealthy attacks on cyber-physical systems
description Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019 === Cataloged from PDF version of thesis. === Includes bibliographical references (pages 63-64). === The goal of this thesis is to develop a defense methodology for a cyber-physical system (CPS) by which an attempted stealthy cyber-attack is detected in near real time. Improvements in networked communication have enabled vast and complex dynamic control systems to exploit networked control schemes to seamlessly integrate parts and processes. These cyber-physical systems exhibit a level of flexibility that was previously unavailable but also introduce communication channels that are vulnerable to outside interference and malicious intervention. This thesis considers the effects of a type of stealthy attack on a class of CPS that can be modeled as linear time-invariant systems. The effects of this attack are studied from both the perspective of the attacker as well as the defender. A previously developed method for conducting stealthy attacks is introduced and analyzed. === This method consists of injecting malicious actuation signals into the control input of a CPS and then designing a sensor attack to conceal the effect of the actuator attack. The result is an attack that cannot be detected upon inspection of the Kalman filter residual. Successful implementation of this attack is shown to require the attacker to attain perfect model knowledge in order for the attack to be stealthy. Based on the execution of past attacks on CPS, this thesis proposes an attacker who starts their attack by "fishing" for critical and confidential system information such as the model parameters. A method is then proposed in which the defender attempts to feed the attacker a slightly falsified model, baiting the fishing attacker with data that will make an attack detectable. Because the attacker's model is no longer correct, their attack design will induce a mean-shift in the Kalman filter residual, breaking the stealthiness of the original attack formula. === It is then shown that the defender can not only detect this faulty attack, but use observations of the Kalman filter residual to regain more accurate state estimates, mitigating the effect of the attack. === by David B. Flamholz. === S.M. === S.M. Massachusetts Institute of Technology, Department of Mechanical Engineering
author2 Anuradha M. Annaswamy.
author_facet Anuradha M. Annaswamy.
Flamholz, David B.
author Flamholz, David B.
author_sort Flamholz, David B.
title Baiting for defense against stealthy attacks on cyber-physical systems
title_short Baiting for defense against stealthy attacks on cyber-physical systems
title_full Baiting for defense against stealthy attacks on cyber-physical systems
title_fullStr Baiting for defense against stealthy attacks on cyber-physical systems
title_full_unstemmed Baiting for defense against stealthy attacks on cyber-physical systems
title_sort baiting for defense against stealthy attacks on cyber-physical systems
publisher Massachusetts Institute of Technology
publishDate 2019
url https://hdl.handle.net/1721.1/121858
work_keys_str_mv AT flamholzdavidb baitingfordefenseagainststealthyattacksoncyberphysicalsystems
_version_ 1719250831579021312