Abstract
We consider an optimal denial-of-service (DoS) attack scheduling problem of N independent linear time-invariant processes, where sensors have limited computational capability. Sensors transmit measurements to the remote estimator via a communication channel that is exposed to DoS attackers. However, due to limited energy, an attacker can only attack a subset of sensors at each time step. To maximally degrade the estimation performance, a DoS attacker needs to determine which sensors to attack at each time step. In this context, a deep reinforcement learning (DRL) algorithm, which combines Q-learning with a deep neural network, is introduced to solve the Markov decision process (MDP). The DoS attack scheduling optimization problem is formulated as an MDP that is solved by the DRL algorithm. A numerical example is provided to illustrate the efficiency of the optimal DoS attack scheduling scheme using the DRL algorithm.
Similar content being viewed by others
References
Wu G Y, Wang G, Sun J, et al. Optimal partial feedback attacks in cyber-physical power systems. IEEE Trans Autom Control, 2020, 65: 3919–3926
Pang Z H, Liu G P, Zhou D H, et al. Data-based predictive control for networked nonlinear systems with network-induced delay and packet dropout. IEEE Trans Ind Electron, 2016, 63: 1249–1257
Lu A Y, Yang G H. Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Trans Autom Control, 2018, 63: 1813–1820
Wang G, Giannakis G B, Chen J, et al. Distribution system state estimation: an overview of recent developments. Front Inf Technol Electron Eng, 2019, 20: 4–17
Wu C W, Hu Z R, Liu J X, et al. Secure estimation for cyber-physical systems via sliding mode. IEEE Trans Cybern, 2018, 48: 3420–3431
Pang Z H, Liu G P, Zhou D, et al. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Trans Ind Electron, 2016, 63: 3242–3251
Chen J, Wang G, Sun J. Power scheduling for Kalman filtering over lossy wireless sensor networks. IET Control Theory Appl, 2016, 11: 531–540
Yang G, Zhou X S. Intelligent CPS: features and challenges. Sci China Inf Sci, 2016, 59: 050102
Gupta B, Brij B. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Boca Raton: CRC Press, 2018
Vijayan J. Stuxnet renews power grid security concerns. Computerworld, 2010. http://www.computerworld.com/artical/2519574/security0/stuxnet-renews-power-grid-security-concerns.html
Teixeira A, Shames I, Sandberg H, et al. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135–148
Kwon C, Liu W Y, Hwang I. Security analysis for cyber-physical systems against stealthy deception attacks. In: Proceedings of American Control Conference, Washington, 2013. 3344–3349
Mo Y, Chabukswar R, Sinopoli B. Detecting integrity attacks on SCADA systems. IEEE Trans Control Syst Technol, 2014, 22: 1396–1407
Guo Z Y, Shi D W, Johansson K H, et al. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 2018, 89: 117–124
Wu G Y, Sun J, Chen J. Optimal data injection attacks in cyber-physical systems. IEEE Trans Cybern, 2018, 48: 3302–3312
Mo Y, Sinopoli B. Secure control against replay attacks. In: Proceedings of Annual Allerton Conference, Illinois, 2009. 911–918
Teixeira A, Shames I, Sandberg H, et al. Revealing stealthy attacks in control systems. In: Proceedings of Annual Allerton Conference, Illinois, 2012. 1806–1813
Hou F Y, Sun J. Covert attacks against output tracking control of cyber-physical systems. In: Proceedings of the 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, 2017. 5743–5748
Cárdenas A, Amin S, Sastry S. Research challenges for the security of control systems. In: Proceedings of Conference Hot Topics Security, California, 2018
Yang Y, Li Y F, Yue D. Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels. Sci China Inf Sci, 2020, 63: 150208
Li W T, Wen C K, Chen J C, et al. Location identification of power line outages using PMU measurements with bad data. IEEE Trans Power Syst, 2016, 31: 3624–3635
Amin S, Cárdenas A, Sastry S. Safe and secure networked control systems under denial-of-service attacks. In: Proceedings of International Workshop on Hybrid Systems: Computation and Control, 2009. 31–45
Wang J Z, Shi L. Optimal DoS attacks on remote state estimation with a router. In: Proceedings of IEEE Conference on Decision and Control, Florida, 2018. 6384–6389
Chhabra M, Gupta B, Almomani A. A novel solution to handle DDOS attack in MANET. J Inform Secur, 2013, 4: 165–179
Bhushan K, Gupta B B. Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Human Comput, 2019, 10: 1985–1997
Bhardwaj A, Goundar S. Comparing single tier and three tier infrastructure designs against DDoS attacks. Int J Cloud Appl Comput, 2017, 7: 59–75
Almomani A, Alauthman M, Albalas F, et al. An online intrusion detection system to cloud computing based on NeuCube algorithms. Intern J Cloud App Comp, 2018, 8: 96–112
Zhang H, Cheng P, Shi L, et al. Optimal DoS attack scheduling in wireless networked control system. IEEE Trans Contr Syst Technol, 2016, 24: 843–852
Zhang H, Qi Y F, Wu J F, et al. DoS attack energy management against remote state estimation. IEEE Trans Control Netw Syst, 2018, 5: 383–394
Qin J H, Li M L, Wang J, et al. Optimal denial-of-service attack energy management against state estimation over an SINR-based network. Automatica, 2020, 119: 109090
Qin J H, Li M L, Shi L, et al. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans Autom Control, 2018, 63: 1648–1663
Zhang H, Zhu Y Z, Li Z J, et al. DoS attack power allocation against remote state estimation via a block fading channel. In: Proceedings of Chinese Control Conference, Wuhan, 2018. 6441–6446
Yang C, Yang W, Shi H B. DoS attack in centralised sensor network against state estimation. IET Control Theory Appl, 2018, 12: 1244–1253
Mnih V, Kavukcuoglu K, Silver D, et al. Playing atari with deep reinforcement learning. 2013. ArXiv:1312.5602v1
Mnih V, Kavukcuoglu K, Silver D, et al. Human-level control through deep reinforcement learning. Nature, 2015, 518: 529–533
Yang Q L, Wang G, Sadeghi A, et al. Two-timescale voltage control in distribution grids using deep reinforcement learning. IEEE Trans Smart Grid, 2020, 11: 2313–2323
Leong A, Ramaswamy A, Duevedo D, et al. Deep reinforcement learning for wireless sensor scheduling in cyber-physical systems. Automatica, 2020, 113: 108759
Sadeghi A, Wang G, Giannakis G B. Deep reinforcement learning for adaptive caching in hierarchical content delivery networks. IEEE Trans Cogn Commun Netw, 2019, 5: 1024–1033
Lian J, Li C, Xia B. Sampled-data control of switched linear systems with application to an F-18 aircraft. IEEE Trans Ind Electron, 2017, 64: 1332–1340
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. U1613225, 61925303, 62088101, 61673023).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hou, F., Sun, J., Yang, Q. et al. Deep reinforcement learning for optimal denial-of-service attacks scheduling. Sci. China Inf. Sci. 65, 162201 (2022). https://doi.org/10.1007/s11432-020-3027-0
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-020-3027-0