This work addresses the problem of diagnosability analysis of a networked discrete event system under external malicious attacks, in which the considered system is modeled by labeled Petri net, and is attacked by a given replacement structure (i.e., the original transition label is replaced by a different label or empty string). In addition, we assume that the attack is stealthy and intermittent, which requires that the corrupted observations should belong to the normal behavior of the system, and the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack), respectively. The aim of this work is, from an attacker viewpoint, to design a K-corruption intermittent attacks for violating the diagnosability of systems. To this end, an attack automaton and complete unfolded verifier, i.e., a special automaton, are established to analyze all the potential attacked paths. Then an algorithm is proposed to obtain the K-corruption intermittent attacks, and examples are used to illustrate the proposed attack method.

K-corruption Intermittent Attacks for Violating the Diagnosability / Liu, Ruotian; Mangini, Agostino Marcello; Fanti, Maria Pia. - ELETTRONICO. - 56:2(2023), pp. 1847-1852. [10.1016/j.ifacol.2023.10.1900]

K-corruption Intermittent Attacks for Violating the Diagnosability

Liu, Ruotian;Mangini, Agostino Marcello;Fanti, Maria Pia
2023-01-01

Abstract

This work addresses the problem of diagnosability analysis of a networked discrete event system under external malicious attacks, in which the considered system is modeled by labeled Petri net, and is attacked by a given replacement structure (i.e., the original transition label is replaced by a different label or empty string). In addition, we assume that the attack is stealthy and intermittent, which requires that the corrupted observations should belong to the normal behavior of the system, and the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack), respectively. The aim of this work is, from an attacker viewpoint, to design a K-corruption intermittent attacks for violating the diagnosability of systems. To this end, an attack automaton and complete unfolded verifier, i.e., a special automaton, are established to analyze all the potential attacked paths. Then an algorithm is proposed to obtain the K-corruption intermittent attacks, and examples are used to illustrate the proposed attack method.
2023
K-corruption Intermittent Attacks for Violating the Diagnosability / Liu, Ruotian; Mangini, Agostino Marcello; Fanti, Maria Pia. - ELETTRONICO. - 56:2(2023), pp. 1847-1852. [10.1016/j.ifacol.2023.10.1900]
File in questo prodotto:
File Dimensione Formato  
2023_K-corruption_Intermittent_Attacks_for_Violating_the_Diagnosability_pdfeditoriale.pdf

accesso aperto

Tipologia: Versione editoriale
Licenza: Creative commons
Dimensione 760.02 kB
Formato Adobe PDF
760.02 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11589/274622
Citazioni
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact