核心概念
Cyber-physical systems (CPS) are vulnerable to adversarial attacks that can lead to catastrophic consequences. This survey examines existing recovery methods to restore CPS to desirable physical states after attacks, categorizing them as shallow (without dedicated recovery controllers) and deep (with dedicated recovery controllers) approaches.
摘要
This survey reviews 30 papers on recovering cyber-physical systems (CPS) from adversarial attacks. It first provides an overview of CPS vulnerabilities, including attack purposes, surfaces, and targets. The survey then categorizes recovery methods into two main approaches:
Shallow Recovery:
- Component Redundancy: Leveraging redundant components to exclude corrupted ones and maintain system operation.
- Feedback Signal Restoration: Repairing lost or corrupted sensor signals using techniques like ARIMA modeling and deep learning.
- State Estimation: Predicting the actual physical state using system dynamics, either with known white-box models or learned black-box models.
- Response Selection: Selecting the optimal response from a candidate set to mitigate attack impact.
Deep Recovery:
- Non-Machine Learning-based Control Synthesis: Designing recovery controllers using techniques like linear programming, LQR, and MPC to stabilize the system or reach a safe state.
- Machine Learning-based Control Synthesis: Leveraging reinforcement learning and other ML methods to learn optimal recovery policies.
The survey also discusses two exploratory papers that do not propose recovery solutions but provide insights to facilitate recovery research. Finally, it identifies untouched sub-domains and suggests future research directions in this emerging field.
統計資料
"The global CPS market size is expected to grow from 86 billion dollars in 2022 to 137 billion dollars by 2028 [28]."
"In 2013, the worldwide CPS market is anticipated to be worth $44 billion dollars. The market for CPS is anticipated to increase by 7.6% from 2013 to 2021 [28]."
引述
"Cyber-physical systems (CPSs) integrate control, computing and sensing through physical components, and have been rapidly sprouting over the past years [13]."
"Unfortunately, malicious attacks mutually evolve with the development in CPS and potentially lead to catastrophes [33, 43, 44]."
"Recovery is always required. However, we find that relative few publications have addressed CPS recovery methods, compared to numerous research on detection."