Control of discrete event systems subject to cyber attacks
Autor(a) principal: | |
---|---|
Data de Publicação: | 2022 |
Tipo de documento: | Tese |
Idioma: | eng |
Título da fonte: | Repositório Institucional da UFMG |
Texto Completo: | http://hdl.handle.net/1843/55775 |
Resumo: | The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented. |
id |
UFMG_76382027adb387ea63a6e7eaf52f2d71 |
---|---|
oai_identifier_str |
oai:repositorio.ufmg.br:1843/55775 |
network_acronym_str |
UFMG |
network_name_str |
Repositório Institucional da UFMG |
repository_id_str |
|
spelling |
Patrícia Nascimento Penahttp://lattes.cnpq.br/5778873769416387Karen Gail RudieLilian Kawakami CarvalhoMax Hering de QueirozRicardo Hiroshi Caldeira TakahashiCarlos Andrey Maiahttp://lattes.cnpq.br/3683951692822860Michel Rodrigo das Chagas Alves2023-07-04T20:13:08Z2023-07-04T20:13:08Z2022-11-09http://hdl.handle.net/1843/55775The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented.O objeto de estudo dessa tese são os sistemas modelados como sistemas a eventos discretos. O sistema é composto por vários subsistemas cujo comportamento é coordenado pela ação de um controlador, que por sua vez é uma estrutura composta, dentre outros elementos, pelos supervisores. Considera-se que tanto o controlador quanto cada um dos subsistemas estão conectados a uma rede de comunicação e que estão sujeitos à ação de um agente malicioso que pode modificar as mensagens enviadas e recebidas. Inicialmente são apresentados resultados relativos a uma propriedade chamada P-observabilidade para um conjunto de ataque, que garante, sob certas circunstâncias, a obtenção de um supervisor que assegura que o comportamento desejado é sempre obtido, independentemente da ação do agente malicioso. Em seguida, apresenta-se um novo modelo de ataque, que considera diferentes ações que um atacante pode realizar num sistema real. Além disso, é definida uma nova classe atacantes, chamados de persistentes. Adicionalmente, apresenta-se uma técnica para o projeto dessa classe de atacantes, que têm o objetivo de realizar o ataque e ao mesmo tempo permanecerem ocultos. Finalmente, os detalhes da implementação de um testbed para técnicas de projeto de atacantes são apresentados.engUniversidade Federal de Minas GeraisPrograma de Pós-Graduação em Engenharia ElétricaUFMGBrasilENG - DEPARTAMENTO DE ENGENHARIA ELÉTRICAEngenharia elétricaTecnologia da informaçãoInformáticaInternet - Sistemas de segurançaSoftware - ProteçãoVírus de computadorCyber-attacksDiscrete-event systemsPersistent attackersSupervisory control theoryControl of discrete event systems subject to cyber attacksControle de sistemas a eventos discretos sujeitos a cyber attaquesinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisinfo:eu-repo/semantics/openAccessreponame:Repositório Institucional da UFMGinstname:Universidade Federal de Minas Gerais (UFMG)instacron:UFMGCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8811https://repositorio.ufmg.br/bitstream/1843/55775/2/license_rdfcfd6801dba008cb6adbd9838b81582abMD52ORIGINALtese_final.pdftese_final.pdfVersão final teseapplication/pdf3075739https://repositorio.ufmg.br/bitstream/1843/55775/6/tese_final.pdf778cee94c9a311cfaae7c9f7049b4bb9MD56LICENSElicense.txtlicense.txttext/plain; charset=utf-82118https://repositorio.ufmg.br/bitstream/1843/55775/7/license.txtcda590c95a0b51b4d15f60c9642ca272MD571843/557752023-07-04 17:13:09.162oai:repositorio.ufmg.br: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ório de PublicaçõesPUBhttps://repositorio.ufmg.br/oaiopendoar:2023-07-04T20:13:09Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG)false |
dc.title.pt_BR.fl_str_mv |
Control of discrete event systems subject to cyber attacks |
dc.title.alternative.pt_BR.fl_str_mv |
Controle de sistemas a eventos discretos sujeitos a cyber attaques |
title |
Control of discrete event systems subject to cyber attacks |
spellingShingle |
Control of discrete event systems subject to cyber attacks Michel Rodrigo das Chagas Alves Cyber-attacks Discrete-event systems Persistent attackers Supervisory control theory Engenharia elétrica Tecnologia da informação Informática Internet - Sistemas de segurança Software - Proteção Vírus de computador |
title_short |
Control of discrete event systems subject to cyber attacks |
title_full |
Control of discrete event systems subject to cyber attacks |
title_fullStr |
Control of discrete event systems subject to cyber attacks |
title_full_unstemmed |
Control of discrete event systems subject to cyber attacks |
title_sort |
Control of discrete event systems subject to cyber attacks |
author |
Michel Rodrigo das Chagas Alves |
author_facet |
Michel Rodrigo das Chagas Alves |
author_role |
author |
dc.contributor.advisor1.fl_str_mv |
Patrícia Nascimento Pena |
dc.contributor.advisor1Lattes.fl_str_mv |
http://lattes.cnpq.br/5778873769416387 |
dc.contributor.advisor-co1.fl_str_mv |
Karen Gail Rudie |
dc.contributor.referee1.fl_str_mv |
Lilian Kawakami Carvalho |
dc.contributor.referee2.fl_str_mv |
Max Hering de Queiroz |
dc.contributor.referee3.fl_str_mv |
Ricardo Hiroshi Caldeira Takahashi |
dc.contributor.referee4.fl_str_mv |
Carlos Andrey Maia |
dc.contributor.authorLattes.fl_str_mv |
http://lattes.cnpq.br/3683951692822860 |
dc.contributor.author.fl_str_mv |
Michel Rodrigo das Chagas Alves |
contributor_str_mv |
Patrícia Nascimento Pena Karen Gail Rudie Lilian Kawakami Carvalho Max Hering de Queiroz Ricardo Hiroshi Caldeira Takahashi Carlos Andrey Maia |
dc.subject.por.fl_str_mv |
Cyber-attacks Discrete-event systems Persistent attackers Supervisory control theory |
topic |
Cyber-attacks Discrete-event systems Persistent attackers Supervisory control theory Engenharia elétrica Tecnologia da informação Informática Internet - Sistemas de segurança Software - Proteção Vírus de computador |
dc.subject.other.pt_BR.fl_str_mv |
Engenharia elétrica Tecnologia da informação Informática Internet - Sistemas de segurança Software - Proteção Vírus de computador |
description |
The objects of study of this thesis are systems modeled as discrete-event systems. The system is composed of several subsystems whose behavior is coordinated by the action of a controller, which in turn is a structure composed, among other elements, by supervisors. It is considered that the controller and each of the subsystems are connected to a communication network and that they are subject to the action of a malicious agent that is able to modify the messages sent and received. Initially, results related to a property called P-observability for an attack set are presented, which guarantees, under certain circumstances, obtaining a supervisor that ensures that the desired behavior is always obtained, regardless of the action of the malicious agent. Next, a new attack model is presented, which considers the different types of actions an attacker is able to do in a real system. Additionally, a new class of attackers is introduced, called persistent attackers. Moreover, new design technique for this class of attackers is presented, which have the goal to perform the attack while remaining stealthy. Finally, the details about the implementation of a testbed for attacker design techniques is presented. |
publishDate |
2022 |
dc.date.issued.fl_str_mv |
2022-11-09 |
dc.date.accessioned.fl_str_mv |
2023-07-04T20:13:08Z |
dc.date.available.fl_str_mv |
2023-07-04T20:13:08Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/doctoralThesis |
format |
doctoralThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/1843/55775 |
url |
http://hdl.handle.net/1843/55775 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.publisher.none.fl_str_mv |
Universidade Federal de Minas Gerais |
dc.publisher.program.fl_str_mv |
Programa de Pós-Graduação em Engenharia Elétrica |
dc.publisher.initials.fl_str_mv |
UFMG |
dc.publisher.country.fl_str_mv |
Brasil |
dc.publisher.department.fl_str_mv |
ENG - DEPARTAMENTO DE ENGENHARIA ELÉTRICA |
publisher.none.fl_str_mv |
Universidade Federal de Minas Gerais |
dc.source.none.fl_str_mv |
reponame:Repositório Institucional da UFMG instname:Universidade Federal de Minas Gerais (UFMG) instacron:UFMG |
instname_str |
Universidade Federal de Minas Gerais (UFMG) |
instacron_str |
UFMG |
institution |
UFMG |
reponame_str |
Repositório Institucional da UFMG |
collection |
Repositório Institucional da UFMG |
bitstream.url.fl_str_mv |
https://repositorio.ufmg.br/bitstream/1843/55775/2/license_rdf https://repositorio.ufmg.br/bitstream/1843/55775/6/tese_final.pdf https://repositorio.ufmg.br/bitstream/1843/55775/7/license.txt |
bitstream.checksum.fl_str_mv |
cfd6801dba008cb6adbd9838b81582ab 778cee94c9a311cfaae7c9f7049b4bb9 cda590c95a0b51b4d15f60c9642ca272 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositório Institucional da UFMG - Universidade Federal de Minas Gerais (UFMG) |
repository.mail.fl_str_mv |
|
_version_ |
1803589305762840576 |