Undetectable Attacks on Boolean Networks

Shiyong Zhu*, Jianquan Lu, Jinde Cao, Lin Lin, James Lam, Michael Ng, Shun Ichi Azuma

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

2 Citations (Scopus)

Abstract

In this paper, driven by the ever-increasing cyber-security threats, we study the undetectable attack problems for Boolean networks (BNs), which model distributed systems with a limited capacity of storage and bandwidth of communication. Given a consistent monitor, undetectable attacks are formalized for BNs as those do not yield an output sequence out of the nominal output sequence set. By the graph-theoretic approach, undetectable attacks are characterized by a reachability problem of a directed cycle in the augmented transition graph. On the other hand, the algebraic approach also derives a necessary and sufficient criterion for undetectable attacks by testing the existence of the nonzero elements in the constructed matrix. While all these derived results are only computationally efficient for relatively small-size BNs. The detection of attack signals is indeed NP-hard. In other words, there is no polynomial-time algorithm to check the detectability of an attack signal or an attack node set unless NP=P.

Original languageEnglish
Title of host publication2023 62nd IEEE Conference on Decision and Control, CDC 2023
PublisherIEEE
Pages1698-1703
Number of pages6
ISBN (Electronic)9798350301243, 9798350301236
ISBN (Print)9798350301250
DOIs
Publication statusPublished - Dec 2023
Event62nd IEEE Conference on Decision and Control, CDC 2023 - , Singapore
Duration: 13 Dec 202315 Dec 2023
https://ieeexplore.ieee.org/xpl/conhome/10383192/proceeding

Publication series

NameProceedings of the IEEE Conference on Decision and Control
ISSN (Print)0743-1546
ISSN (Electronic)2576-2370

Conference

Conference62nd IEEE Conference on Decision and Control, CDC 2023
Country/TerritorySingapore
Period13/12/2315/12/23
Internet address

Scopus Subject Areas

  • Control and Systems Engineering
  • Modelling and Simulation
  • Control and Optimization

User-Defined Keywords

  • Algebraic state space representation
  • Boolean networks
  • NP-hardness
  • Security
  • Un-detectable attacks

Fingerprint

Dive into the research topics of 'Undetectable Attacks on Boolean Networks'. Together they form a unique fingerprint.

Cite this