Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
المؤلف | Taheri, M. |
المؤلف | Khorasani, Khashayar |
المؤلف | Meskin, Nader |
المؤلف | Shames, Iman |
تاريخ الإتاحة | 2023-03-29T11:28:38Z |
تاريخ النشر | 2022-01-01 |
اسم المنشور | Proceedings of the IEEE Conference on Decision and Control |
المعرّف | http://dx.doi.org/10.1109/CDC51059.2022.9993087 |
الاقتباس | Taheri, M., Khorasani, K., Meskin, N., & Shames, I. (2022, December). Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems. In 2022 IEEE 61st Conference on Decision and Control (CDC) (pp. 6769-6775). IEEE. |
الترقيم الدولي الموحد للكتاب | 9781665467612 |
الرقم المعياري الدولي للكتاب | 07431546 |
الملخص | This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing the Koopman operator theory, a given control affine CPS is transformed into the Koopman canonical form, and its relative degree is defined in terms of the Koopman modes, Koopman eigenvalues, and Koopman eigenfunctions. Consequently, the relative degree of the CPS is utilized to determine zero dynamics cyber-attacks. In contrast to the linear case, adversaries need to compromise both input and output communication channels of the CPS to maintain their attacks undetected. Moreover, the Koopman canonical form of the CPS is used to define and implement covert cyber-attacks in nonlinear CPS. The extended dynamic mode decomposition (EDMD) provides a linear finite-dimensional approximation of the CPS. Consequently, approximated dynamics of the CPS are utilized to introduce data-driven zero dynamics and covert cyber-attacks. Finally, a numerical example is provided to illustrate the effectiveness of our proposed methods. |
راعي المشروع | The authors would like to acknowledge the financial support received from NATO under the Emerging Security Challenges Division program. K. Khorasani and N. Meskin would like to acknowledge the support received from NPRP grant number 10-0105-17017 from the Qatar National Research Fund (a member of Qatar Foundation). K. Khorasani would also like to acknowledge the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programs. This work was also supported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND). Any opinions and conclusions in this work are strictly those of the authors and do not reflect the views, positions, or policies of - and are not endorsed by - IDEaS, DND, or the Government of Canada. |
اللغة | en |
الناشر | Institute of Electrical and Electronics Engineers Inc. |
الموضوع | Computer crime Crime Cyber attacks |
النوع | Conference Paper |
الصفحات | 6769-6775 |
رقم المجلد | 2022-December |
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
الهندسة الكهربائية [2649 items ]