Attack-and-Defense Games for Control Systems
Author | : Huanhuan Yuan |
Publisher | : CRC Press |
Total Pages | : 252 |
Release | : 2024-08-06 |
ISBN-10 | : 9781040093894 |
ISBN-13 | : 1040093892 |
Rating | : 4/5 (94 Downloads) |
Download or read book Attack-and-Defense Games for Control Systems written by Huanhuan Yuan and published by CRC Press. This book was released on 2024-08-06 with total page 252 pages. Available in PDF, EPUB and Kindle. Book excerpt: This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks. Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.