Font Size: a A A

Research On Network Attack Strategy Based On Zonotopic Theory

Posted on:2021-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:H QiuFull Text:PDF
GTID:2518306329983899Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
This paper mainly studies the security issues of networked control systems based on the theory of zonotope.With the continuous development and integration of control technology,computer network technology and communication technology,network control systems have emerged and are widely used.However,due to the open and shared nature of the network control system,it is more vulnerable to attacks from the outside world.The main contribution of this paper is to study the optimal attack strategy and coordinated attack strategy for the network control system with unknown-but-bounded noise.First,a new estimation method based on zonotope is proposed.The principle of this method is to use the intersection of the prediction equation and the measurement equation to obtain an accurate set of states,and to estimate the state of the system.Secondly,an attack detection method based on the fully symmetric polytope theory and an optimal false data attack strategy are proposed.Combined with the theory of zonotope,an attack detection method based on system residuals is designed.Assuming that the attacker knows all the knowledge of the system,the attacker designs an optimal false data attack strategy,which needs to satisfy the two conditions of the inequality constraint of attack detection and the maximum estimation error.Finally,on this basis,a cooperative false data attack strategy based on the fully symmetric polytope theory is proposed.In order to obtain a better attack effect,the attacker has designed a coordinated attack strategy that can realize covert attacks.The coordinated attack strategy is designed for the attacker to carefully control the false data and measure the false data,and then inject them into the controller side and the false data side of the system respectively.The synergy of this strategy is embodied in that the purpose of the false data injected on the system controller side is to interfere with the state of the system,and the false data injected on the sensor side is to eliminate the adverse effects caused by system changes and avoid being detected by the detector.In order to verify the validity and correctness of the method,numerical simulation is used to verify the proposed strategy.
Keywords/Search Tags:attack strategy, network control system, unknown-but-bounded, false data, zonotope
PDF Full Text Request
Related items