figshare
Browse
Weerakkody_cmu_0041E_10303.pdf (3.63 MB)

Active Detection for Resilient Cyber-Physical Systems

Download (3.63 MB)
thesis
posted on 2018-09-16, 00:00 authored by Sean WeerakkodySean Weerakkody
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence in
critical infrastructures such as transportation, energy delivery, and health care make such systems a
target of malevolent entities while their complexity, connectivity, and heterogeneity offer surfaces
for attackers to leverage. One important aim of potential attackers is to remain stealthy. An attacker
that avoids detection is able to disrupt CPS for long periods of time, without having to worry about
defender interference, allowing an adversary to potentially maximize their impact. Intelligent
attackers can leverage their system knowledge, disruption resources, and disclosure resources to
impart critical damage to systems, all the while remaining stealthy.
In this dissertationwe consider the development of active methods to detect intelligent, powerful,
and malicious adversaries in cyber-physical systems. While standard attack detection involves
producing intelligent algorithms to process information about a system, active detection involves
the intelligent design and modification of the inputs, parameters, and structure of a system in
order to impede an adversary’s ability to generate stealthy attacks. This thesis will propose several
methods for active detection in cyber-physical systems.
We will first consider the design of secret random perturbations at the control input, which we
term as physical watermarking. We will evaluate this approach against both replay attacks and
model aware adversaries. Next, we will consider how naturally occurring stochastic phenomena
in a CPS can be utilized for the purposes of active detection. Specifically, we will evaluate how
packet drops at the control input can act as an environmental watermark for the benefit of security.
Then, we will consider how changing parameters of the plant itself can be used to thwart otherwise
model aware attackers. We term this the moving target approach. Two designs are explored.
We will consider a switched system model where parameters of the plant are directly changed.
Alternatively, we evaluate an authenticating subsystem model where we use an extended system
to detect attacks on the CPS under consideration. The moving target involves online changes to
the system. Instead, we can consider robust offline design. In particular, we use structural system theory to analyze and design distributed control systems, which can not be targeted by a class of stealthy attacks. To conclude, motivated by studies in software security, we explore how tools of information flow analysis can be used for the analysis and design of active detection techniques.

History

Date

2018-09-16

Degree Type

  • Dissertation

Department

  • Electrical and Computer Engineering

Degree Name

  • Doctor of Philosophy (PhD)

Advisor(s)

Bruno Sinopoli

Usage metrics

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC