Login | Register

Detection and Identification of Covert and Replay Attacks in Cyber-physical Systems Using Model-Based and Data-Driven Based Methods

Title:

Detection and Identification of Covert and Replay Attacks in Cyber-physical Systems Using Model-Based and Data-Driven Based Methods

Firoozi, Kimia (2024) Detection and Identification of Covert and Replay Attacks in Cyber-physical Systems Using Model-Based and Data-Driven Based Methods. Masters thesis, Concordia University.

[thumbnail of Firoozi_MASc_S2025.pdf]
Preview
Text (application/pdf)
Firoozi_MASc_S2025.pdf - Accepted Version
Available under License Spectrum Terms of Access.
10MB

Abstract

Cyber-physical systems (CPSs) have revolutionized various domains, including smart grids, manufacturing, transportation systems, and autonomous vehicles such as Unmanned Aerial Vehicles (UAVs). While CPS configurations offer numerous advantages, they are particularly vulnerable to stealthy cyber-attacks due to their specific structure, in which the command and control center is far from the plant and operation side, making security a critical concern. Among these attacks, covert and replay attacks pose significant challenges for detection, particularly in UAV applications. This research focuses on detecting such stealthy attacks using two approaches: a model-based scenario where the mathematical model of the system is available and a data-driven scenario where only data is accessible, making it more practical for high-fidelity systems.
In the model-based approach, the research develops a coding design to enhance the detection functionality and expand its scope to meet security requirements. This framework strengthens the system’s ability to counter stealthy attacks effectively. On the other hand, for scenarios where only data is available and inherently vulnerable to cyber-attacks, an effective algorithm is designed
to detect and identify covert and replay attacks by assigning appropriate labels. This algorithm leverages neural network (NN) models for training and evaluation, ensuring high accuracy and
proficiency in attack detection.
To optimize computational efficiency, the algorithm employs feature selection techniques during the data preprocessing stage, minimizing the reliance on complex NN models. This not only
reduces computational resource consumption but also enhances the accuracy of the detection model. The effectiveness of the proposed methodologies is validated through simulations on a 6-degree-of-freedom quadrotor, a critical application highly susceptible to cyber-attacks. The results demonstrate the efficiency and reliability of the contributions in detecting and mitigating stealthy cyberattacks in CPS configurations.
This research provides a framework for improving the security of CPSs in both model-based and data-driven scenarios, contributing to safer and more resilient systems in critical applications.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Thesis (Masters)
Authors:Firoozi, Kimia
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Electrical and Computer Engineering
Date:6 December 2024
Thesis Supervisor(s):Khorasani, Khashayar
ID Code:994958
Deposited By: Kimia Firoozi
Deposited On:17 Jun 2025 17:14
Last Modified:17 Jun 2025 17:14
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top