-
Safety-Critical Online Control with Adversarial Disturbances
Authors:
Bhaskar Ramasubramanian,
Baicen Xiao,
Linda Bushnell,
Radha Poovendran
Abstract:
This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider…
▽ More
This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider an online setting where costs at each time are revealed only after the controller at that time is chosen. We propose an iterative approach to the synthesis of the controller by solving a modified discrete-time Riccati equation. Solutions of this equation enforce the safety constraint. We compare the cost of this controller with that of the optimal controller when one has complete knowledge of disturbances and costs in hindsight. We show that the regret function, which is defined as the difference between these costs, varies logarithmically with the time horizon. We validate our approach on a process control setup that is subject to two kinds of adversarial attacks.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries
Authors:
Bhaskar Ramasubramanian,
Luyao Niu,
Andrew Clark,
Linda Bushnell,
Radha Poovendran
Abstract:
A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is m…
▽ More
A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is modeled as a stochastic game. We synthesize a controller for the CPS to maximize the probability of satisfying the LTL objective under any policy of this adversary. The second adversary is an eavesdropper who can observe labeled trajectories of the CPS generated from the previous step. It could then use this information to launch other kinds of attacks. A labeled trajectory is a sequence of labels, where a label is associated to a state and is linked to the satisfaction of the LTL objective at that state. We use differential privacy to quantify the indistinguishability between states that are related to each other when the eavesdropper sees a labeled trajectory. Two trajectories of equal length will be differentially private if they are differentially private at each state along the respective trajectories. We use a skewed Kantorovich metric to compute distances between probability distributions over states resulting from actions chosen according to policies from related states in order to quantify differential privacy. Moreover, we do this in a manner that does not affect the satisfaction probability of the LTL objective. We validate our approach on a simulation of a UAV that has to satisfy an LTL objective in an adversarial environment.
△ Less
Submitted 26 July, 2020;
originally announced July 2020.
-
A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats
Authors:
Dinuka Sahabandu,
Shana Moothedath,
Joey Allen,
Linda Bushnell,
Wenke Lee,
Radha Poovendran
Abstract:
Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flow Tracking (DIFT) is a promising detection mechanism for detecting APTs. DIFT taints information flows originating at system entities that are suscept…
▽ More
Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flow Tracking (DIFT) is a promising detection mechanism for detecting APTs. DIFT taints information flows originating at system entities that are susceptible to an attack, tracks the propagation of the tainted flows, and authenticates the tainted flows at certain system components according to a pre-defined security policy. Deployment of DIFT to defend against APTs in cyber systems is limited by the heavy resource and performance overhead associated with DIFT. In this paper, we propose a resource-efficient model for DIFT by incorporating the security costs, false-positives, and false-negatives associated with DIFT. Specifically, we develop a game-theoretic framework and provide an analytical model of DIFT that enables the study of trade-off between resource efficiency and the effectiveness of detection. Our game model is a nonzero-sum, infinite-horizon, average reward stochastic game. Our model incorporates the information asymmetry between players that arises from DIFT's inability to distinguish malicious flows from benign flows and APT's inability to know the locations where DIFT performs a security analysis. Additionally, the game has incomplete information as the transition probabilities (false-positive and false-negative rates) are unknown. We propose a multiple-time scale stochastic approximation algorithm to learn an equilibrium solution of the game. We prove that our algorithm converges to an average reward Nash equilibrium. We evaluate our proposed model and algorithm on a real-world ransomware dataset and validate the effectiveness of the proposed approach.
△ Less
Submitted 28 June, 2021; v1 submitted 30 June, 2020;
originally announced July 2020.
-
Controlled Islanding via Weak Submodularity
Authors:
Zhipeng Liu,
Andrew Clark,
Linda Bushnell,
Daniel Kirschen,
Radha Poovendran
Abstract:
Cascading failures typically occur following a large disturbance in power systems, such as tripping of a generating unit or a transmission line. Such failures can propagate and destabilize the entire power system, potentially leading to widespread outages. One approach to mitigate impending cascading failures is through controlled islanding, in which a set of transmission lines is deliberately tri…
▽ More
Cascading failures typically occur following a large disturbance in power systems, such as tripping of a generating unit or a transmission line. Such failures can propagate and destabilize the entire power system, potentially leading to widespread outages. One approach to mitigate impending cascading failures is through controlled islanding, in which a set of transmission lines is deliberately tripped to partition the unstable system into several disjoint, internally stable islands. Selecting such a set of transmission lines is inherently a combinatorial optimization problem. Current approaches address this problem in two steps: first classify coherent generators into groups and then separate generator groups into different islands with minimal load-generation imbalance. These methods, however, are based on computationally expensive heuristics that do not provide optimality guarantees. In this paper, we propose a novel approach to controlled islanding based on weak submodularity. Our formulation jointly captures the minimal generator non-coherency and minimal load-generation imbalance in one objective function. We relax the problem to a formulation with bounded submodularity ratio and a matroid constraint, and propose an approximation algorithm which achieves a provable optimality bound on non-coherency and load-generation imbalance. The proposed framework is tested on IEEE 39-bus and 118-bus power systems.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Distributed Observers Design for Leader-Following Control of Multi-Agent Networks (Extended Version)
Authors:
Yiguang Hong,
Guanrong Chen,
Linda Bushnell
Abstract:
This paper is concerned with a leader-follower problem for a multi-agent system with a switching interconnection topology. Distributed observers are designed for the second-order follower-agents, under the common assumption that the velocity of the active leader cannot be measured in real time. Some dynamic neighbor-based rules, consisting of distributed controllers and observers for the autonomou…
▽ More
This paper is concerned with a leader-follower problem for a multi-agent system with a switching interconnection topology. Distributed observers are designed for the second-order follower-agents, under the common assumption that the velocity of the active leader cannot be measured in real time. Some dynamic neighbor-based rules, consisting of distributed controllers and observers for the autonomous agents, are developed to keep updating the information of the leader. With the help of an explicitly constructed common Lyapunov function (CLF), it is proved that each agent can follow the active leader. Moreover, the tracking error is estimated even in a noisy environment. Finally, a numerical example is given for illustration.
△ Less
Submitted 31 December, 2017;
originally announced January 2018.
-
Minimal Input Selection for Robust Control
Authors:
Zhipeng Liu,
Yao Long,
Andrew Clark,
Phillip Lee,
Linda Bushnell,
Daniel Kirschen,
Radha Poovendran
Abstract:
This paper studies the problem of selecting a minimum-size set of input nodes to guarantee stability of a networked system in the presence of uncertainties and time delays. Current approaches to input selection in networked dynamical systems focus on nominal systems with known parameter values in the absence of delays. We derive sufficient conditions for existence of a stabilizing controller for a…
▽ More
This paper studies the problem of selecting a minimum-size set of input nodes to guarantee stability of a networked system in the presence of uncertainties and time delays. Current approaches to input selection in networked dynamical systems focus on nominal systems with known parameter values in the absence of delays. We derive sufficient conditions for existence of a stabilizing controller for an uncertain system that are based on a subset of system modes lying within the controllability subspace induced by the set of inputs. We then formulate the minimum input selection problem and prove that it is equivalent to a discrete optimization problem with bounded submodularity ratio, leading to polynomial-time algorithms with provable optimality bounds. We show that our approach is applicable to different types of uncertainties, including additive and multiplicative uncertainties in the system matrices as well as uncertain time delays. We demonstrate our approach in a numerical case study on the IEEE 39-bus test power system.
△ Less
Submitted 11 December, 2017; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Input Selection for Performance and Controllability of Structured Linear Descriptor Systems
Authors:
Andrew Clark,
Basel Alomair,
Linda Bushnell,
Radha Poovendran
Abstract:
A common approach to controlling complex networks is to directly control a subset of input nodes, which then controls the remaining nodes via network interactions. While techniques have been proposed for selecting input nodes based on either performance metrics or controllability, a unifying approach based on joint consideration of performance and controllability is an open problem. In this paper,…
▽ More
A common approach to controlling complex networks is to directly control a subset of input nodes, which then controls the remaining nodes via network interactions. While techniques have been proposed for selecting input nodes based on either performance metrics or controllability, a unifying approach based on joint consideration of performance and controllability is an open problem. In this paper, we develop a submodular optimization framework for selecting input nodes based on joint performance and controllability in structured linear descriptor systems. We develop our framework for arbitrary linear descriptor systems. In developing our framework, we first prove that selecting a minimum-size set of input nodes for controllability is a matroid intersection problem that can be solved in polynomial-time in the network size. We then prove that input selection to maximize a performance metric with controllability as a constraint is equivalent to maximizing a monotone submodular function with two matroid basis constraints, and derive efficient approximation algorithms with provable optimality bounds for input selection. Finally, we present a graph controllability index metric, which characterizes the largest controllable subgraph of a given complex network, and prove its submodular structure, leading to input selection algorithms that trade-off performance and controllability. We provide improved optimality guarantees for known systems such as strongly connected networks, consensus networks, networks of double integrators, and networks where all system parameters (e.g., link weights) are chosen independently and at random.
△ Less
Submitted 11 December, 2014;
originally announced December 2014.
-
A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems
Authors:
Andrew Clark,
Linda Bushnell,
Radha Poovendran
Abstract:
In many applications of multi-agent systems (MAS), a set of leader agents acts as a control input to the remaining follower agents. In this paper, we introduce an analytical approach to selecting leader agents in order to minimize the total mean-square error of the follower agent states from their desired value in steady-state in the presence of noisy communication links. We show that the problem…
▽ More
In many applications of multi-agent systems (MAS), a set of leader agents acts as a control input to the remaining follower agents. In this paper, we introduce an analytical approach to selecting leader agents in order to minimize the total mean-square error of the follower agent states from their desired value in steady-state in the presence of noisy communication links. We show that the problem of choosing leaders in order to minimize this error can be solved using supermodular optimization techniques, leading to efficient algorithms that are within a provable bound of the optimum. We formulate two leader selection problems within our framework, namely the problem of choosing a fixed number of leaders to minimize the error, as well as the problem of choosing the minimum number of leaders to achieve a tolerated level of error. We study both leader selection criteria for different scenarios, including MAS with static topologies, topologies experiencing random link or node failures, switching topologies, and topologies that vary arbitrarily in time due to node mobility. In addition to providing provable bounds for all these cases, simulation results demonstrate that our approach outperforms other leader selection methods, such as node degree-based and random selection methods, and provides comparable performance to current state of the art algorithms.
△ Less
Submitted 4 August, 2012;
originally announced August 2012.