Control of discrete event systems subject to cyber attacks

Detalhes bibliográficos
Autor(a) principal: Michel Rodrigo das Chagas Alves
Data de Publicação: 2022
Tipo de documento: Tese
Idioma: eng
Título da fonte: Repositório Institucional da UFMG
Texto Completo: http://hdl.handle.net/1843/55775
Resumo: The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented.
id UFMG_76382027adb387ea63a6e7eaf52f2d71
oai_identifier_str oai:repositorio.ufmg.br:1843/55775
network_acronym_str UFMG
network_name_str Repositório Institucional da UFMG
repository_id_str
spelling Patrícia Nascimento Penahttp://lattes.cnpq.br/5778873769416387Karen Gail RudieLilian Kawakami CarvalhoMax Hering de QueirozRicardo Hiroshi Caldeira TakahashiCarlos Andrey Maiahttp://lattes.cnpq.br/3683951692822860Michel Rodrigo das Chagas Alves2023-07-04T20:13:08Z2023-07-04T20:13:08Z2022-11-09http://hdl.handle.net/1843/55775The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented.O objeto de estudo dessa tese são os sistemas modelados como sistemas a eventos discretos. O sistema é composto por vários subsistemas cujo comportamento é coordenado pela ação de um controlador, que por sua vez é uma estrutura composta, dentre outros elementos, pelos supervisores. Considera-se que tanto o controlador quanto cada um dos subsistemas estão conectados a uma rede de comunicação e que estão sujeitos à ação de um agente malicioso que pode modificar as mensagens enviadas e recebidas. Inicialmente são apresentados resultados relativos a uma propriedade chamada P-observabilidade para um conjunto de ataque, que garante, sob certas circunstâncias, a obtenção de um supervisor que assegura que o comportamento desejado é sempre obtido, independentemente da ação do agente malicioso. Em seguida, apresenta-se um novo modelo de ataque, que considera diferentes ações que um atacante pode realizar num sistema real. Além disso, é definida uma nova classe atacantes, chamados de persistentes. Adicionalmente, apresenta-se uma técnica para o projeto dessa classe de atacantes, que têm o objetivo de realizar o ataque e ao mesmo tempo permanecerem ocultos. Finalmente, os detalhes da implementação de um testbed para técnicas de projeto de atacantes são apresentados.engUniversidade Federal de Minas GeraisPrograma de Pós-Graduação em Engenharia ElétricaUFMGBrasilENG - DEPARTAMENTO DE ENGENHARIA ELÉTRICAEngenharia elétricaTecnologia da informaçãoInformáticaInternet - Sistemas de segurançaSoftware - ProteçãoVírus de computadorCyber-attacksDiscrete-event systemsPersistent attackersSupervisory control theoryControl of discrete event systems subject to cyber attacksControle de sistemas a eventos discretos sujeitos a cyber attaquesinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisinfo:eu-repo/semantics/openAccessreponame:Repositório Institucional da UFMGinstname:Universidade Federal de Minas Gerais (UFMG)instacron:UFMGCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8811https://repositorio.ufmg.br/bitstream/1843/55775/2/license_rdfcfd6801dba008cb6adbd9838b81582abMD52ORIGINALtese_final.pdftese_final.pdfVersão final teseapplication/pdf3075739https://repositorio.ufmg.br/bitstream/1843/55775/6/tese_final.pdf778cee94c9a311cfaae7c9f7049b4bb9MD56LICENSElicense.txtlicense.txttext/plain; charset=utf-82118https://repositorio.ufmg.br/bitstream/1843/55775/7/license.txtcda590c95a0b51b4d15f60c9642ca272MD571843/557752023-07-04 17:13:09.162oai:repositorio.ufmg.br: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ório de PublicaçõesPUBhttps://repositorio.ufmg.br/oaiopendoar:2023-07-04T20:13:09Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)false
dc.title.pt_BR.fl_str_mv Control of discrete event systems subject to cyber attacks
dc.title.alternative.pt_BR.fl_str_mv Controle de sistemas a eventos discretos sujeitos a cyber attaques
title Control of discrete event systems subject to cyber attacks
spellingShingle Control of discrete event systems subject to cyber attacks
Michel Rodrigo das Chagas Alves
Cyber-attacks
Discrete-event systems
Persistent attackers
Supervisory control theory
Engenharia elétrica
Tecnologia da informação
Informática
Internet - Sistemas de segurança
Software - Proteção
Vírus de computador
title_short Control of discrete event systems subject to cyber attacks
title_full Control of discrete event systems subject to cyber attacks
title_fullStr Control of discrete event systems subject to cyber attacks
title_full_unstemmed Control of discrete event systems subject to cyber attacks
title_sort Control of discrete event systems subject to cyber attacks
author Michel Rodrigo das Chagas Alves
author_facet Michel Rodrigo das Chagas Alves
author_role author
dc.contributor.advisor1.fl_str_mv Patrícia Nascimento Pena
dc.contributor.advisor1Lattes.fl_str_mv http://lattes.cnpq.br/5778873769416387
dc.contributor.advisor-co1.fl_str_mv Karen Gail Rudie
dc.contributor.referee1.fl_str_mv Lilian Kawakami Carvalho
dc.contributor.referee2.fl_str_mv Max Hering de Queiroz
dc.contributor.referee3.fl_str_mv Ricardo Hiroshi Caldeira Takahashi
dc.contributor.referee4.fl_str_mv Carlos Andrey Maia
dc.contributor.authorLattes.fl_str_mv http://lattes.cnpq.br/3683951692822860
dc.contributor.author.fl_str_mv Michel Rodrigo das Chagas Alves
contributor_str_mv Patrícia Nascimento Pena
Karen Gail Rudie
Lilian Kawakami Carvalho
Max Hering de Queiroz
Ricardo Hiroshi Caldeira Takahashi
Carlos Andrey Maia
dc.subject.por.fl_str_mv Cyber-attacks
Discrete-event systems
Persistent attackers
Supervisory control theory
topic Cyber-attacks
Discrete-event systems
Persistent attackers
Supervisory control theory
Engenharia elétrica
Tecnologia da informação
Informática
Internet - Sistemas de segurança
Software - Proteção
Vírus de computador
dc.subject.other.pt_BR.fl_str_mv Engenharia elétrica
Tecnologia da informação
Informática
Internet - Sistemas de segurança
Software - Proteção
Vírus de computador
description The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented.
publishDate 2022
dc.date.issued.fl_str_mv 2022-11-09
dc.date.accessioned.fl_str_mv 2023-07-04T20:13:08Z
dc.date.available.fl_str_mv 2023-07-04T20:13:08Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/doctoralThesis
format doctoralThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/1843/55775
url http://hdl.handle.net/1843/55775
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.publisher.none.fl_str_mv Universidade Federal de Minas Gerais
dc.publisher.program.fl_str_mv Programa de Pós-Graduação em Engenharia Elétrica
dc.publisher.initials.fl_str_mv UFMG
dc.publisher.country.fl_str_mv Brasil
dc.publisher.department.fl_str_mv ENG - DEPARTAMENTO DE ENGENHARIA ELÉTRICA
publisher.none.fl_str_mv Universidade Federal de Minas Gerais
dc.source.none.fl_str_mv reponame:Repositório Institucional da UFMG
instname:Universidade Federal de Minas Gerais (UFMG)
instacron:UFMG
instname_str Universidade Federal de Minas Gerais (UFMG)
instacron_str UFMG
institution UFMG
reponame_str Repositório Institucional da UFMG
collection Repositório Institucional da UFMG
bitstream.url.fl_str_mv https://repositorio.ufmg.br/bitstream/1843/55775/2/license_rdf
https://repositorio.ufmg.br/bitstream/1843/55775/6/tese_final.pdf
https://repositorio.ufmg.br/bitstream/1843/55775/7/license.txt
bitstream.checksum.fl_str_mv cfd6801dba008cb6adbd9838b81582ab
778cee94c9a311cfaae7c9f7049b4bb9
cda590c95a0b51b4d15f60c9642ca272
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)
repository.mail.fl_str_mv
_version_ 1803589305762840576