This work addresses the problem of diagnosability analysis of a networked discrete event system under external malicious attacks, in which the considered system is modeled by labeled Petri net, and is attacked by a given replacement structure (i.e., the original transition label is replaced by a different label or empty string). In addition, we assume that the attack is stealthy and intermittent, which requires that the corrupted observations should belong to the normal behavior of the system, and the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack), respectively. The aim of this work is, from an attacker viewpoint, to design a K-corruption intermittent attacks for violating the diagnosability of systems. To this end, an attack automaton and complete unfolded verifier, i.e., a special automaton, are established to analyze all the potential attacked paths. Then an algorithm is proposed to obtain the K-corruption intermittent attacks, and examples are used to illustrate the proposed attack method.

K-corruption Intermittent Attacks for Violating the Diagnosability / Liu, R.; Mangini, A. M.; Fanti, M. P.. - 56:2(2023), pp. 1847-1852. (Intervento presentato al convegno 22nd IFAC World Congress tenutosi a jpn nel 2023) [10.1016/j.ifacol.2023.10.1900].

K-corruption Intermittent Attacks for Violating the Diagnosability

Liu R.;Mangini A. M.;Fanti M. P.
2023-01-01

Abstract

This work addresses the problem of diagnosability analysis of a networked discrete event system under external malicious attacks, in which the considered system is modeled by labeled Petri net, and is attacked by a given replacement structure (i.e., the original transition label is replaced by a different label or empty string). In addition, we assume that the attack is stealthy and intermittent, which requires that the corrupted observations should belong to the normal behavior of the system, and the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack), respectively. The aim of this work is, from an attacker viewpoint, to design a K-corruption intermittent attacks for violating the diagnosability of systems. To this end, an attack automaton and complete unfolded verifier, i.e., a special automaton, are established to analyze all the potential attacked paths. Then an algorithm is proposed to obtain the K-corruption intermittent attacks, and examples are used to illustrate the proposed attack method.
2023
22nd IFAC World Congress
K-corruption Intermittent Attacks for Violating the Diagnosability / Liu, R.; Mangini, A. M.; Fanti, M. P.. - 56:2(2023), pp. 1847-1852. (Intervento presentato al convegno 22nd IFAC World Congress tenutosi a jpn nel 2023) [10.1016/j.ifacol.2023.10.1900].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11589/274622
Citazioni
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact