Determination of Cyberattack Parameters on the Measurements System of Critical Infrastructure Facility
DOI:
https://doi.org/10.20535/tacs.2664-29132025.2.339005Abstract
The paper solves the problem of detection and researching the parameters of stealth attacks on the linear Kalman filter data measurement system that bypasses the standard fault diagnosis detector. The relevance of the research is determined not only by the importance of solving cyber security problems, but also by the active use of the Kalman filter in large industrial power supply networks to evaluate the indicators of system nodes, in industrial automation systems, and others. A cyber attack on the measuring system of the Kalman filter is under consideration, the purpose of which is to disrupt the normal functioning of the filter by distorting the measurement signal, which is a mandatory component of the filter. The filtering system is equipped with a fault detector, which detects the presence of an attack on the measurement signals. The condition of the attack is invisibility for the fault detector, that is, the attacker implements a class of stealth attacks on the integrity of the information that circulates and is processed in the system. The task of finding a distorted measurement signal was solved using the variational optimization method and the gradient method of the fastest descent. A computational experiment was conducted, the quantitative characteristics of the algorithm were obtained and analyzed. The proposed method and the corresponding algorithm for determining the parameters of stealth attacks on the measurement system of critical infrastructure objects can be used to solve the problems of testing cyber defense systems.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).