Skip to main content
Erschienen in: Artificial Life and Robotics 1/2024

13.11.2023 | Original Article

Poisoning attack on VIMT and its adverse effect

verfasst von: Taichi Ikezaki, Osamu Kaneko, Kenji Sawada, Junya Fujita

Erschienen in: Artificial Life and Robotics | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, various approaches have been proposed to design control systems that directly utilize data without mathematical plant models. Data-driven control involves updating or redesigning a controller using actual operating data, enabling fine-tuning control systems and achieving desired characteristics. However, the increasing prevalence of cyber-attacks targeting control systems presents significant societal challenges. A study by Russo and Proutiere (in Proceeding of American Control Conference (ACC), 2021) showed a poisoning approach targeting virtual reference feedback tuning, a data-driven control method. The study suggests that compromising the data used in the data-driven method may result in the closed-loop performance failing to achieve desired specifications and, in the worst case, destabilizing the control system. Hence, investigating the adverse effects of cyber-attacks on data employed in data-driven methods becomes crucial. This study explores the impact of a poisoning attack on the data used in the data-driven control method, specifically emphasizing virtual internal model tuning as a representative data-driven control approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
ServoTechno.corp.
 
Literatur
1.
Zurück zum Zitat Russo A, Proutiere A (2021) Poisoning attack against data-driven control methods. In: Proceeding of American control conference (ACC), pp 3234–3241 Russo A, Proutiere A (2021) Poisoning attack against data-driven control methods. In: Proceeding of American control conference (ACC), pp 3234–3241
2.
Zurück zum Zitat Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. IEEE Conference on Decision and Control, pp 6838–6843 Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. IEEE Conference on Decision and Control, pp 6838–6843
3.
Zurück zum Zitat Fujita S, Hata K, Mochizuki A, Sawada K, Shin S, Hosokawa S (2021) OpenPLC-based control system testbed for PLC whitelisting system. Artif Life Robot 26:149–154CrossRef Fujita S, Hata K, Mochizuki A, Sawada K, Shin S, Hosokawa S (2021) OpenPLC-based control system testbed for PLC whitelisting system. Artif Life Robot 26:149–154CrossRef
4.
Zurück zum Zitat Fujita J, Ogura T, Okochi K, Matsumoto N, Sawada K, Kaneko O (2021) The structured cyber-attack scenario expression model based on diamond model and adversarial states. IEEJ Trans Electron Inf Syst 142(3):328–338 Fujita J, Ogura T, Okochi K, Matsumoto N, Sawada K, Kaneko O (2021) The structured cyber-attack scenario expression model based on diamond model and adversarial states. IEEJ Trans Electron Inf Syst 142(3):328–338
5.
Zurück zum Zitat Hjalmarsson H, Gevers M, Gunnarsson S, Lequin O (1998) Iterative feedback tuning: theory and applications. IEEE Control Syst Mag 18(4):26–41CrossRef Hjalmarsson H, Gevers M, Gunnarsson S, Lequin O (1998) Iterative feedback tuning: theory and applications. IEEE Control Syst Mag 18(4):26–41CrossRef
6.
Zurück zum Zitat Campi MC, Lecchini A, Savaresi SM (2002) Virtual reference feedback tuning—a direct method for the design of feedback controllers—. Automatica 38(8):1337–1446MathSciNetCrossRef Campi MC, Lecchini A, Savaresi SM (2002) Virtual reference feedback tuning—a direct method for the design of feedback controllers—. Automatica 38(8):1337–1446MathSciNetCrossRef
7.
Zurück zum Zitat Souma S, Kaneko O, Fujii T (2004) A new approach to parameter tuning of controllers by using one-shot experimental data. Trans Inst Syst Control Inf Eng 17(12):528–536 Souma S, Kaneko O, Fujii T (2004) A new approach to parameter tuning of controllers by using one-shot experimental data. Trans Inst Syst Control Inf Eng 17(12):528–536
8.
Zurück zum Zitat Ikezaki T, Kaneko O (2019) A new approach to parameter tuning of controllers by using output data of closed loop system—a proposal of virtual internal model tuning—. IEEJ Trans Electron Inf Syst Jpn 39(7):780–785 Ikezaki T, Kaneko O (2019) A new approach to parameter tuning of controllers by using output data of closed loop system—a proposal of virtual internal model tuning—. IEEJ Trans Electron Inf Syst Jpn 39(7):780–785
9.
Zurück zum Zitat Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure?. In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16–25 Barreno M, Nelson B, Sears R, Joseph AD, Tygar JD (2006) Can machine learning be secure?. In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16–25
10.
Zurück zum Zitat Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings of the 29th international conference on machine learning (ICML), pp 1467–1474 Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings of the 29th international conference on machine learning (ICML), pp 1467–1474
11.
Zurück zum Zitat Teixeria A, Sou KC, Sandberg H, Johansson KH (2015) Secure control systems: a quantitative risk management approach. IEEE Control Syst Mag 35(1):24–45MathSciNetCrossRef Teixeria A, Sou KC, Sandberg H, Johansson KH (2015) Secure control systems: a quantitative risk management approach. IEEE Control Syst Mag 35(1):24–45MathSciNetCrossRef
Metadaten
Titel
Poisoning attack on VIMT and its adverse effect
verfasst von
Taichi Ikezaki
Osamu Kaneko
Kenji Sawada
Junya Fujita
Publikationsdatum
13.11.2023
Verlag
Springer Japan
Erschienen in
Artificial Life and Robotics / Ausgabe 1/2024
Print ISSN: 1433-5298
Elektronische ISSN: 1614-7456
DOI
https://doi.org/10.1007/s10015-023-00914-7

Weitere Artikel der Ausgabe 1/2024

Artificial Life and Robotics 1/2024 Zur Ausgabe

Neuer Inhalt