We study the problem of learning-based attacks in linear systems, where the communication channel between the controller and the plant can be hijacked by a malicious attacker. We assume the attacker learns the dynamics of the system from observations, then overrides the controller's actuation signal, while mimicking legitimate operation by providing fictitious sensor readings to the controller. On the other hand, the controller is on a lookout to detect the presence of the attacker and tries to enhance the detection performance by carefully crafting its control signals. We study the trade-offs between the information acquired by the attacker from observations, the detection capabilities of the controller, and the control cost. Specifically, we provide tight upper and lower bounds on the expected $\epsilon$-deception time, namely the time required by the controller to make a decision regarding the presence of an attacker with confidence at least $(1-\epsilon\log(1/\epsilon))$. We then show a probabilistic lower bound on the time that must be spent by the attacker learning the system, in order for the controller to have a given expected $\epsilon$-deception time. We show that this bound is also order optimal, in the sense that if the attacker satisfies it, then there exists a learning algorithm with the given order expected deception time. Finally, we show a lower bound on the expected energy expenditure required to guarantee detection with confidence at least $1-\epsilon \log(1/\epsilon)$.
翻译:我们研究线性系统中以学习为基础的攻击问题,在线性系统中,控制者与工厂之间的通信渠道可以被恶意攻击者劫持。我们假设攻击者从观察中了解系统的动态,然后超越控制者的动作信号,同时通过向控制者提供假传感读数来模拟合法操作。另一方面,控制者正在寻找发现攻击者的存在,并试图通过仔细设计其控制信号来提高探测性能。我们研究了攻击者从观察、控制者的探测能力和控制费用中获得的信息之间的权衡。具体地说,我们为预期的美元迷你信号提供紧紧紧的上下限,即控制者需要多少时间来决定攻击者的存在,但至少要1\\\\ epsilon\ log (1/\ epsilon) 。然后我们展示攻击者必须花在系统上的时间的稳定性较低,以便控制者在预期的 $\ eplon- dededection时间上有一个预期的 值,如果我们所预期的测算值最终需要的能量序列,那么我们就会显示一个最低的测算法。