电子电气工程与控制

防御一类网络隐蔽攻击的自适应控制策略

  • 黄鑫 ,
  • 邹嘉赫 ,
  • 肖舒怡 ,
  • 李小杭
展开
  • 1.东北电力大学 自动化工程学院,吉林 132012
    2.太原理工大学 电气与动力工程学院,太原 030024
    3.南京航空航天大学 直升机动力学全国重点实验室/直升机研究院,南京 210016

收稿日期: 2025-05-24

  修回日期: 2025-08-11

  录用日期: 2025-09-17

  网络出版日期: 2025-09-24

基金资助

国家自然科学基金(62573109);国家自然科学基金(62103094);国家自然科学基金(62403346);吉林省自然科学基金(YDZJ202201ZYTS379);东北电力大学博士科研启动资金(BSJXM-2021107);山西省基础研究计划项目(202203021222101)

An adaptive control strategy for defending against cyber stealthy attacks

  • Xin HUANG ,
  • Jiahe ZOU ,
  • Shuyi XIAO ,
  • Xiaohang LI
Expand
  • 1.School of Automation Engineering,Northeast Electric Power University,Jilin 132012,China
    2.College of Electrical and Power Engineering,Taiyuan University of Technology,Taiyuan 030024,China
    3.National Key Laboratory of Helicopter Dynamics/Helicopter Research Institute,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China

Received date: 2025-05-24

  Revised date: 2025-08-11

  Accepted date: 2025-09-17

  Online published: 2025-09-24

Supported by

National Natural Science Foundation of China(62573109);Natinal Natural Science Foundation of Jilin Province(YDZJ202201ZYTS379);Northeast Electric Power University Doctoral Research Initiation Fund(BSJXM-2021107);Shanxi Provincial Basic Research Program(202203021222101)

摘要

在信息物理系统中,不确定性涉及到系统在运行时遇到的各种不可预测因素,其影响系统性能以及可靠性,增加了系统所面临的安全威胁,使系统更易受到攻击。隐蔽攻击能够成功地绕过异常检测器的检测,同时恶意地破坏网络传输的控制输入信号和传感器测量信号,造成系统性能恶化。为防御该类网络攻击,从防守者的角度,利用检测机制和攻击的结构信息,量化了攻击的隐蔽上界,进而提出了一种基于该上界信息的自适应攻击补偿器,使装备该补偿器的控制器有效减少隐蔽攻击对系统性能的影响。飞行控制系统的仿真结果说明了所提控制策略的有效性。

本文引用格式

黄鑫 , 邹嘉赫 , 肖舒怡 , 李小杭 . 防御一类网络隐蔽攻击的自适应控制策略[J]. 航空学报, 2026 , 47(4) : 332290 -332290 . DOI: 10.7527/S1000-6893.2025.32290

Abstract

In the cyber-physical system, the uncertainty involves various unpredictable factors that the system encounters during operation. It affects the system performance and reliability, increases security threats faced by the system, and makes the system more vulnerable to attacks. Stealthy attacks can successfully bypass the detection of the anomaly detector, and maliciously destroy the control input signal and the sensor measurement signal transmitted via networks, resulting in the deterioration of the system performance. In order to defend against such cyber attacks, the stealth upper bound of the attacks is quantified by using the detection mechanism and the structural information of the attacks, and then an adaptive attack compensator is proposed, such that the controller equipped with the compensator can effectively reduce the impact of stealth attacks. Simulation results of the flight control system validate the developed control strategy.

参考文献

[1] 李小杭, 张志虎, 宋春林, 等. 虚假数据注入攻击下的自适应补偿控制[J]. 兵工学报202041(11): 2260-2265.
  LI X H, ZHANG Z H, SONG C L, et al. Adaptive compensation control under false data injection attack[J]. Acta Armamentarii202041(11): 2260-2265 (in Chinese).
[2] 黄鑫, 畅晨旭, 李小杭, 等. 基于协同交互型观测器的虚假数据注入攻击信号重构方法[J]. 兵工学报202344(11): 3359-3368.
  HUANG X, CHANG C X, LI X H, et al. An approach for reconstructing false data injection attack signal based on cooperative interaction observer[J]. Acta Armamentarii202344(11): 3359-3368 (in Chinese).
[3] REN X X, YANG G H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks[J]. International Journal of Robust and Nonlinear Control202030(1): 65-79.
[4] 李笑宇, 冯肖雪, 潘峰, 等. 网络攻击下无人机信息物理系统的自适应状态估计[J]. 航空学报202243(3): 325193.
  LI X Y, FENG X X, PAN F, et al. Adaptive state estimate for unmanned aircraft cyber-physical system with cyber attack[J]. Acta Aeronautica et Astronautica Sinica202243(3): 325193 (in Chinese).
[5] 高煜欣, 张绍杰, 刘春生. 网络攻击下导弹自适应事件触发制导律[J]. 航空学报202445(S1): 730892.
  GAO Y X, ZHANG S J, LIU C S. Adaptive event-triggered guidance law of missile under cyber attacks[J]. Acta Aeronautica et Astronautica Sinica202445(S1): 730892 (in Chinese).
[6] HUANG X, DONG J X. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J]. ISA Transactions2020104: 62-72.
[7] LU A Y, YANG G H. Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks[J]. Automatica201898: 124-129.
[8] LIANG L M, LIU S. Event-triggered distributed attack detection and fault diagnosis[J]. IEEE Transactions on Instrumentation and Measurement202272: 3520111.
[9] DUO W, ZHOU C M, ABUSORRAH A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges[J]. IEEE/CAA Journal of Automatica Sinica20229(05): 784-800.
[10] SU Q Y, FAN Z X, LONG Y, et al. Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers[J]. Journal of the Franklin Institute2020357(17): 12724-12741.
[11] SUI T J, MO Y L, MARELLI D, et al. The vulnerability of cyber-physical system under stealthy attacks[J]. IEEE Transactions on Automatic Control202166(2): 637-650.
[12] 李进, 姜顺, 潘丰. 隐蔽式攻击下网络化控制系统状态与故障的联合区间估计[J]. 控制与决策202338(12): 3418-3426.
  LI J, JIANG S, PAN F. Joint interval estimation of state and fault for networked control systems under stealthy attacks[J]. Control and Decision202338(12): 3418-3426 (in Chinese).
[13] 张淇瑞, 孟思琪, 王兰豪, 等. 隐蔽攻击下信息物理系统的安全输出反馈控制[J]. 自动化学报202450(7): 1363-1372.
  ZHANG Q R, MENG S Q, WANG L H, et al. Secure output-feedback control for cyber-physical systems under stealthy attacks[J]. Acta Automatica Sinica202450(7): 1363-1372 (in Chinese).
[14] SUI T J, SUN X M. The vulnerability of distributed state estimator under stealthy attacks[J]. Automatica2021133: 109869.
[15] CHENG P, YANG Z Y, CHEN J M, et al. An event-based stealthy attack on remote state estimation[J]. IEEE Transactions on Automatic Control202065(10): 4348-4355.
[16] ZHANG Q R, LIU K, XIA Y Q, et al. Optimal stealthy deception attack against cyber-physical systems[J]. IEEE Transactions on Cybernetics202050(9): 3963-3972.
[17] JIN X, HADDAD W M, YUCELEN T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems[J]. IEEE Transactions on Automatic Control201762(11): 6058-6064.
[18] LI J, YANG D F, SU Q Y, et al. Reliable control of cyber-physical systems under state attack: An adaptive integral sliding-mode control approach[J]. IET Control Theory & Applications202418(1): 27-39.
[19] Lü S Y, JIN X Z, WANG H, et al. Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service[J]. Applied Mathematics and Computation2021404: 126255.
[20] LIAN Y D, YANG Q F, XIE W, et al. Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics systems[J]. IEEE Transactions on Industrial Informatics202117(11): 7882-7893.
[21] ZHANG J H, SHI P, XIA Y Q. Robust adaptive sliding-mode control for fuzzy systems with mismatched uncertainties[J]. IEEE Transactions on Fuzzy Systems201018(4): 700-711.
[22] PETERSEN I R, TEMPO R. Robust control of uncertain systems: Classical results and recent developments[J]. Automatica201450(5): 1315-1335.
[23] WANG B, ZHU D H, HAN L Y, et al. Adaptive fault-tolerant control of a hybrid canard rotor/wing UAV under transition flight subject to actuator faults and model uncertainties[J]. IEEE Transactions on Aerospace and Electronic Systems202359(4): 4559-4574.
[24] HUANG X, LI J, SU Q Y. An observer with cooperative interaction structure for biasing attack detection and secure control[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems202253(4): 2543-2553.
[25] LIU M, CAO X B, SHI P. Fuzzy-model-based fault-tolerant design for nonlinear stochastic systems against simultaneous sensor and actuator faults[J]. IEEE Transactions on Fuzzy Systems201221(5): 789-799.
[26] LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy20119(3): 49-51.
[27] LU A Y, YANG G H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism[J]. IEEE Transactions on Automatic Control201863(8): 2596-2603.
[28] YUE D, HAN Q L, LAM J. Network-based robust H ∞ control of systems with uncertainty[J]. Automatica200541(6): 999-1007.
[29] EUGENE L, KEVIN W, HOWE D. Robust and adaptive control with aerospace applications[M]. London: Springer-Verlag London, 2013: 299
[30] CHEN Y, KAR S, MOURA J M F. Dynamic attack detection in cyber-physical systems with side initial state information[J]. IEEE Transactions on Automatic Control201762(9): 4618-4624.
文章导航

/