防御一类网络隐蔽攻击的自适应控制策略
收稿日期: 2025-05-24
修回日期: 2025-08-11
录用日期: 2025-09-17
网络出版日期: 2025-09-24
基金资助
国家自然科学基金(62573109);国家自然科学基金(62103094);国家自然科学基金(62403346);吉林省自然科学基金(YDZJ202201ZYTS379);东北电力大学博士科研启动资金(BSJXM-2021107);山西省基础研究计划项目(202203021222101)
An adaptive control strategy for defending against cyber stealthy attacks
Received date: 2025-05-24
Revised date: 2025-08-11
Accepted date: 2025-09-17
Online published: 2025-09-24
Supported by
National Natural Science Foundation of China(62573109);Natinal Natural Science Foundation of Jilin Province(YDZJ202201ZYTS379);Northeast Electric Power University Doctoral Research Initiation Fund(BSJXM-2021107);Shanxi Provincial Basic Research Program(202203021222101)
黄鑫 , 邹嘉赫 , 肖舒怡 , 李小杭 . 防御一类网络隐蔽攻击的自适应控制策略[J]. 航空学报, 2026 , 47(4) : 332290 -332290 . DOI: 10.7527/S1000-6893.2025.32290
In the cyber-physical system, the uncertainty involves various unpredictable factors that the system encounters during operation. It affects the system performance and reliability, increases security threats faced by the system, and makes the system more vulnerable to attacks. Stealthy attacks can successfully bypass the detection of the anomaly detector, and maliciously destroy the control input signal and the sensor measurement signal transmitted via networks, resulting in the deterioration of the system performance. In order to defend against such cyber attacks, the stealth upper bound of the attacks is quantified by using the detection mechanism and the structural information of the attacks, and then an adaptive attack compensator is proposed, such that the controller equipped with the compensator can effectively reduce the impact of stealth attacks. Simulation results of the flight control system validate the developed control strategy.
| [1] | 李小杭, 张志虎, 宋春林, 等. 虚假数据注入攻击下的自适应补偿控制[J]. 兵工学报, 2020, 41(11): 2260-2265. |
| LI X H, ZHANG Z H, SONG C L, et al. Adaptive compensation control under false data injection attack[J]. Acta Armamentarii, 2020, 41(11): 2260-2265 (in Chinese). | |
| [2] | 黄鑫, 畅晨旭, 李小杭, 等. 基于协同交互型观测器的虚假数据注入攻击信号重构方法[J]. 兵工学报, 2023, 44(11): 3359-3368. |
| HUANG X, CHANG C X, LI X H, et al. An approach for reconstructing false data injection attack signal based on cooperative interaction observer[J]. Acta Armamentarii, 2023, 44(11): 3359-3368 (in Chinese). | |
| [3] | REN X X, YANG G H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks[J]. International Journal of Robust and Nonlinear Control, 2020, 30(1): 65-79. |
| [4] | 李笑宇, 冯肖雪, 潘峰, 等. 网络攻击下无人机信息物理系统的自适应状态估计[J]. 航空学报, 2022, 43(3): 325193. |
| LI X Y, FENG X X, PAN F, et al. Adaptive state estimate for unmanned aircraft cyber-physical system with cyber attack[J]. Acta Aeronautica et Astronautica Sinica, 2022, 43(3): 325193 (in Chinese). | |
| [5] | 高煜欣, 张绍杰, 刘春生. 网络攻击下导弹自适应事件触发制导律[J]. 航空学报, 2024, 45(S1): 730892. |
| GAO Y X, ZHANG S J, LIU C S. Adaptive event-triggered guidance law of missile under cyber attacks[J]. Acta Aeronautica et Astronautica Sinica, 2024, 45(S1): 730892 (in Chinese). | |
| [6] | HUANG X, DONG J X. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J]. ISA Transactions, 2020, 104: 62-72. |
| [7] | LU A Y, YANG G H. Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks[J]. Automatica, 2018, 98: 124-129. |
| [8] | LIANG L M, LIU S. Event-triggered distributed attack detection and fault diagnosis[J]. IEEE Transactions on Instrumentation and Measurement, 2022, 72: 3520111. |
| [9] | DUO W, ZHOU C M, ABUSORRAH A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(05): 784-800. |
| [10] | SU Q Y, FAN Z X, LONG Y, et al. Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers[J]. Journal of the Franklin Institute, 2020, 357(17): 12724-12741. |
| [11] | SUI T J, MO Y L, MARELLI D, et al. The vulnerability of cyber-physical system under stealthy attacks[J]. IEEE Transactions on Automatic Control, 2021, 66(2): 637-650. |
| [12] | 李进, 姜顺, 潘丰. 隐蔽式攻击下网络化控制系统状态与故障的联合区间估计[J]. 控制与决策, 2023, 38(12): 3418-3426. |
| LI J, JIANG S, PAN F. Joint interval estimation of state and fault for networked control systems under stealthy attacks[J]. Control and Decision, 2023, 38(12): 3418-3426 (in Chinese). | |
| [13] | 张淇瑞, 孟思琪, 王兰豪, 等. 隐蔽攻击下信息物理系统的安全输出反馈控制[J]. 自动化学报, 2024, 50(7): 1363-1372. |
| ZHANG Q R, MENG S Q, WANG L H, et al. Secure output-feedback control for cyber-physical systems under stealthy attacks[J]. Acta Automatica Sinica, 2024, 50(7): 1363-1372 (in Chinese). | |
| [14] | SUI T J, SUN X M. The vulnerability of distributed state estimator under stealthy attacks[J]. Automatica, 2021, 133: 109869. |
| [15] | CHENG P, YANG Z Y, CHEN J M, et al. An event-based stealthy attack on remote state estimation[J]. IEEE Transactions on Automatic Control, 2020, 65(10): 4348-4355. |
| [16] | ZHANG Q R, LIU K, XIA Y Q, et al. Optimal stealthy deception attack against cyber-physical systems[J]. IEEE Transactions on Cybernetics, 2020, 50(9): 3963-3972. |
| [17] | JIN X, HADDAD W M, YUCELEN T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems[J]. IEEE Transactions on Automatic Control, 2017, 62(11): 6058-6064. |
| [18] | LI J, YANG D F, SU Q Y, et al. Reliable control of cyber-physical systems under state attack: An adaptive integral sliding-mode control approach[J]. IET Control Theory & Applications, 2024, 18(1): 27-39. |
| [19] | Lü S Y, JIN X Z, WANG H, et al. Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service[J]. Applied Mathematics and Computation, 2021, 404: 126255. |
| [20] | LIAN Y D, YANG Q F, XIE W, et al. Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics systems[J]. IEEE Transactions on Industrial Informatics, 2021, 17(11): 7882-7893. |
| [21] | ZHANG J H, SHI P, XIA Y Q. Robust adaptive sliding-mode control for fuzzy systems with mismatched uncertainties[J]. IEEE Transactions on Fuzzy Systems, 2010, 18(4): 700-711. |
| [22] | PETERSEN I R, TEMPO R. Robust control of uncertain systems: Classical results and recent developments[J]. Automatica, 2014, 50(5): 1315-1335. |
| [23] | WANG B, ZHU D H, HAN L Y, et al. Adaptive fault-tolerant control of a hybrid canard rotor/wing UAV under transition flight subject to actuator faults and model uncertainties[J]. IEEE Transactions on Aerospace and Electronic Systems, 2023, 59(4): 4559-4574. |
| [24] | HUANG X, LI J, SU Q Y. An observer with cooperative interaction structure for biasing attack detection and secure control[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2022, 53(4): 2543-2553. |
| [25] | LIU M, CAO X B, SHI P. Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults[J]. IEEE Transactions on Fuzzy Systems, 2012, 21(5): 789-799. |
| [26] | LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy, 2011, 9(3): 49-51. |
| [27] | LU A Y, YANG G H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism[J]. IEEE Transactions on Automatic Control, 2018, 63(8): 2596-2603. |
| [28] | YUE D, HAN Q L, LAM J. Network-based robust H ∞ control of systems with uncertainty[J]. Automatica, 2005, 41(6): 999-1007. |
| [29] | EUGENE L, KEVIN W, HOWE D. Robust and adaptive control with aerospace applications[M]. London: Springer-Verlag London, 2013: 299 |
| [30] | CHEN Y, KAR S, MOURA J M F. Dynamic attack detection in cyber-physical systems with side initial state information[J]. IEEE Transactions on Automatic Control, 2017, 62(9): 4618-4624. |
/
| 〈 |
|
〉 |