Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets
This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are...
Saved in:
Published in | IEEE/CAA journal of automatica sinica Vol. 12; no. 8; pp. 1661 - 1672 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Chinese Association of Automation (CAA)
01.08.2025
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are replaced by others or empty string, and its attack stealthiness requires that the corrupted observations should be contained in the behavior of system. The aim of this work is, from an attacker viewpoint, to design a stealthy replacement attack for violating the diagnosability of system. To this end, we first build a new structure, called complete unfolded verifier, with the notion of a predefined elementary unsound path that leads to the violation of diagnosability, which is used to enumerate all the potential attacked paths to be transformed into elementary unsound ones. Then an optimal attack synthesis problem in terms of minimum energy cost is formulated by determining whether an elementary unsound path is generated via solving a set of integer nonlinear programming problems. Finally, we show that the nonlinear programming problems can be transformed into integer linear programming problems by introducing additional linear constraints. Examples are used to illustrate the proposed attack strategy. |
---|---|
AbstractList | This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are replaced by others or empty string, and its attack stealthiness requires that the corrupted observations should be contained in the behavior of system. The aim of this work is, from an attacker viewpoint, to design a stealthy replacement attack for violating the diagnosability of system. To this end, we first build a new structure, called complete unfolded verifier, with the notion of a predefined elementary unsound path that leads to the violation of diagnosability, which is used to enumerate all the potential attacked paths to be transformed into elementary unsound ones. Then an optimal attack synthesis problem in terms of minimum energy cost is formulated by determining whether an elementary unsound path is generated via solving a set of integer nonlinear programming problems. Finally, we show that the nonlinear programming problems can be transformed into integer linear programming problems by introducing additional linear constraints. Examples are used to illustrate the proposed attack strategy. |
Author | Liu, Ruotian Fanti, Maria Pia Mangini, Agostino Marcello |
Author_xml | – sequence: 1 givenname: Ruotian orcidid: 0009-0000-1823-1542 surname: Liu fullname: Liu, Ruotian email: ruotian.liu@poliba.it organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125 – sequence: 2 givenname: Agostino Marcello orcidid: 0000-0001-6850-6153 surname: Mangini fullname: Mangini, Agostino Marcello email: agostinomarcello.mangini@poliba.it organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125 – sequence: 3 givenname: Maria Pia orcidid: 0000-0002-8612-1852 surname: Fanti fullname: Fanti, Maria Pia email: mariapia.fanti@poliba.it organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125 |
BookMark | eNpFkMtOwzAQRS1UJErpmg0L_0BSj53nMipvVRRRWEdTZ9waQlLF3uTvcVUEq5nFvVdH55JNur4jxq5BxACiXDxXm1gKmcYgU0izMzaVSpZRKfNk8vdn2QWbO_cphAixPCuTKXvbjJ3fk7OO94avD95-Y8s3nrD1-5FX3qP-chx3aDvn-a3FXdc73NrW-pHbjq9wSy01_JX8YPkLeXfFzg22jua_d8Y-7u_el4_Rav3wtKxWkQalfISQIeht4DUyJVOUGgrdBEiDSaIBUSogKFLQOWCSCU1FY6Qmkgk0ZEDN2OK0q4feuYFMfRgC_TDWIOqjlTpYqY9W6pOV0Lg5NSwR_adBKJVDoX4AUG1gfA |
CODEN | IJASJC |
Cites_doi | 10.1109/LCSYS.2023.3284340 10.1109/LCSYS.2020.2998610 10.1016/j.ifacol.2023.10.1900 10.1109/TAC.2022.3191393 10.1016/j.automatica.2012.06.039 10.1007/s10626-024-00401-6 10.1109/TAC.2023.3239590 10.1016/j.automatica.2021.109714 10.1016/j.isatra.2021.01.036 10.1007/s13235-018-0285-3 10.1016/j.automatica.2023.111330 10.1109/TCNS.2019.2915024 10.1016/j.automatica.2013.04.041 10.1016/j.automatica.2020.108907 10.1109/5.24143 10.1109/TASE.2013.2289360 10.1016/j.automatica.2012.09.017 10.1109/TASE.2024.3416821 10.1109/JAS.2021.1004261 10.1016/j.automatica.2014.02.038 10.1016/j.automatica.2023.110910 10.1109/TAC.2003.814099 10.1109/CDC49753.2023.10383814 10.1109/TAC.2023.3239433 10.1109/TAC.2023.3266021 10.1109/87.486338 10.1109/TAC.2018.2874020 10.1109/TAC.2016.2574120 10.1016/j.automatica.2018.04.006 10.1109/TAC.2021.3051459 10.1109/TAC.2023.3292747 10.1109/SMC.2019.8914035 10.1109/TAC.2024.3367656 10.1016/j.automatica.2010.06.013 10.1007/978-0-387-68612-7 10.1016/j.automatica.2020.109172 10.1038/s41598-022-19737-w 10.1109/TSMC.2024.3351740 10.1109/9.412626 10.1109/TAC.2019.2897553 10.1016/j.automatica.2022.110222 10.1109/TCNS.2023.3312249 10.1016/j.automatica.2022.110736 10.1016/j.automatica.2018.07.017 10.1109/TAC.2023.3253462 10.1109/JAS.2022.105548 10.1109/TSMC.2017.2762823 10.1109/TAC.2020.2983088 10.1016/j.automatica.2024.111971 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/JAS.2025.125156 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore Digital Libary (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2329-9274 |
EndPage | 1672 |
ExternalDocumentID | 10_1109_JAS_2025_125156 11033718 |
Genre | orig-research |
GrantInformation_xml | – fundername: European Union's Horizon Europe research and Innovation Programme grantid: 101076791 funderid: 10.13039/501100000780 |
GroupedDBID | -0I -0Y -SI -S~ 0R~ 4.4 5VR 6IK 92M 97E 9D9 9DI AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AFUIB AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CAJEI EBS EJD IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ Q-- RIA RIE RT9 T8Y TCJ TGT U1F U1G U5I U5S AAYXX CITATION |
ID | FETCH-LOGICAL-c133t-a16a1cb251f25ef89c18cd266fa44c1aa231e1851c71a460ce8df2cee241def13 |
IEDL.DBID | RIE |
ISSN | 2329-9266 |
IngestDate | Wed Aug 27 16:27:56 EDT 2025 Wed Aug 27 07:36:57 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c133t-a16a1cb251f25ef89c18cd266fa44c1aa231e1851c71a460ce8df2cee241def13 |
ORCID | 0009-0000-1823-1542 0000-0001-6850-6153 0000-0002-8612-1852 |
PageCount | 12 |
ParticipantIDs | ieee_primary_11033718 crossref_primary_10_1109_JAS_2025_125156 |
PublicationCentury | 2000 |
PublicationDate | 2025-August |
PublicationDateYYYYMMDD | 2025-08-01 |
PublicationDate_xml | – month: 08 year: 2025 text: 2025-August |
PublicationDecade | 2020 |
PublicationTitle | IEEE/CAA journal of automatica sinica |
PublicationTitleAbbrev | JAS |
PublicationYear | 2025 |
Publisher | Chinese Association of Automation (CAA) |
Publisher_xml | – name: Chinese Association of Automation (CAA) |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref17 ref16 ref19 ref18 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ref2 ref1 ref39 ref38 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 |
References_xml | – ident: ref35 doi: 10.1109/LCSYS.2023.3284340 – ident: ref15 doi: 10.1109/LCSYS.2020.2998610 – ident: ref42 doi: 10.1016/j.ifacol.2023.10.1900 – ident: ref10 doi: 10.1109/TAC.2022.3191393 – ident: ref26 doi: 10.1016/j.automatica.2012.06.039 – ident: ref7 doi: 10.1007/s10626-024-00401-6 – ident: ref14 doi: 10.1109/TAC.2023.3239590 – ident: ref8 doi: 10.1016/j.automatica.2021.109714 – ident: ref2 doi: 10.1016/j.isatra.2021.01.036 – ident: ref21 doi: 10.1007/s13235-018-0285-3 – ident: ref12 doi: 10.1016/j.automatica.2023.111330 – ident: ref16 doi: 10.1109/TCNS.2019.2915024 – ident: ref31 doi: 10.1016/j.automatica.2013.04.041 – ident: ref46 doi: 10.1016/j.automatica.2020.108907 – ident: ref48 doi: 10.1109/5.24143 – ident: ref27 doi: 10.1109/TASE.2013.2289360 – ident: ref36 doi: 10.1016/j.automatica.2012.09.017 – ident: ref39 doi: 10.1109/TASE.2024.3416821 – ident: ref3 doi: 10.1109/JAS.2021.1004261 – ident: ref32 doi: 10.1016/j.automatica.2014.02.038 – ident: ref9 doi: 10.1016/j.automatica.2023.110910 – ident: ref25 doi: 10.1109/TAC.2003.814099 – ident: ref40 doi: 10.1109/CDC49753.2023.10383814 – ident: ref34 doi: 10.1109/TAC.2023.3239433 – ident: ref37 doi: 10.1109/TAC.2023.3266021 – ident: ref24 doi: 10.1109/87.486338 – ident: ref29 doi: 10.1109/TAC.2018.2874020 – ident: ref44 doi: 10.1109/TAC.2016.2574120 – ident: ref20 doi: 10.1016/j.automatica.2018.04.006 – ident: ref22 doi: 10.1109/TAC.2021.3051459 – ident: ref47 doi: 10.1109/TAC.2023.3292747 – ident: ref6 doi: 10.1109/SMC.2019.8914035 – ident: ref18 doi: 10.1109/TAC.2024.3367656 – ident: ref43 doi: 10.1016/j.automatica.2010.06.013 – ident: ref49 doi: 10.1007/978-0-387-68612-7 – ident: ref11 doi: 10.1016/j.automatica.2020.109172 – ident: ref13 doi: 10.1038/s41598-022-19737-w – ident: ref30 doi: 10.1109/TSMC.2024.3351740 – ident: ref23 doi: 10.1109/9.412626 – ident: ref33 doi: 10.1109/TAC.2019.2897553 – ident: ref41 doi: 10.1016/j.automatica.2022.110222 – ident: ref17 doi: 10.1109/TCNS.2023.3312249 – ident: ref19 doi: 10.1016/j.automatica.2022.110736 – ident: ref4 doi: 10.1016/j.automatica.2018.07.017 – ident: ref5 doi: 10.1109/TAC.2023.3253462 – ident: ref1 doi: 10.1109/JAS.2022.105548 – ident: ref28 doi: 10.1109/TSMC.2017.2762823 – ident: ref45 doi: 10.1109/TAC.2020.2983088 – ident: ref38 doi: 10.1016/j.automatica.2024.111971 |
SSID | ssj0001257694 |
Score | 2.3236501 |
Snippet | This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In... |
SourceID | crossref ieee |
SourceType | Index Database Publisher |
StartPage | 1661 |
SubjectTerms | Automata Costs Cyber attack diagnosability discrete event system (DES) Discrete-event systems Europe Finite element analysis Firing Focusing labeled Petri net (LPN) Labeling Optimization Petri nets |
Title | Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets |
URI | https://ieeexplore.ieee.org/document/11033718 |
Volume | 12 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA62Jz34rFhf5ODBS9pNN_vIsailFK1gLfS2ZLMTKepW7PZQf72T7BYXQfAWlgTCTMj3TXbmG0KuTJb62vghA6EkE2EsmAw8xSJl9cSR0ZvYFjg_jMPhVIxmwawqVne1MADgks-gY4fuX3620Cv7VNZFqPJ9vEwbpIGRW1msVXtQQersGh8iSZBMIvJUUj7ck91Rf4LBYC_oWEC33aprKFRrq-JQZbBHxpv9lMkkr51VkXb01y-pxn9veJ_sVvyS9ssDcUC2ID8kOzXVwSPyNFnnSPuW8yVdGPqId8Y7rrCJvW_oNdovClt3T9WLmiN3pLdlMl6p572m85zeqxTBKqOuGxcdQ7Fskeng7vlmyKrWCkxjUFowxUPFdYq2ML0ATCw1j3WGJjNKCM2VQtoHCOVcR1yJ0NMQZ6aHgIqAn4Hh_jFp5oscTgiFSMUg08ALIRCcg4pAySDObHCm0dptcr0xdfJRKmgkLvLwZIJeSaxXktIrbdKyNvyZVpnv9I_vZ2Tbri7z8c5Js_hcwQVyhCK9dGfjG91luFU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELWgHIADaxFl9YEDl7Rx4yw-ViwqpQ0SbaXeIscZowpIEU0P5esZJ6mIkJC4RVYSWW8svzf2LIRc6SR2lHY8C7gUFvcCbgnXlpYvTT1xVPQ6MAnOg9Drjnlv4k7KZPU8FwYA8uAzaJrH_C4_mamFOSprIVU5Dm6m62QDid9lRbpW5UgFxXPe-hBlgrAEck9ZzIfZotXrDNEdbLtNQ-mmX3WFhyqNVXJeud8l4WpGRTjJa3ORxU319atY47-nvEd2SoVJO8WS2CdrkB6Q7UrdwUPyPFymKPzm0zmdafqEu8Y7fmFCe9_QbrSTZSbznsoXOUX1SG-LcLyioveSTlPalzHSVULzflw0hGxeJ-P7u9FN1yqbK1gK3dLMksyTTMWIhW67oAOhWKAShExLzhWTEoUfIJkz5TPJPVtBkOg2UipSfgKaOUekls5SOCYUfBmAiF3bA5czBtIHKdwgMe6ZQrQb5HoFdfRR1NCIct_DFhFaJTJWiQqrNEjdYPjzWgnfyR_jl2SzOxr0o_5D-HhKtsyfiui8M1LLPhdwjoohiy_ydfINq3O7ng |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Synthesis+of+Optimal+Stealthy+Attacks+against+Diagnosability+in+Labeled+Petri+Nets&rft.jtitle=IEEE%2FCAA+journal+of+automatica+sinica&rft.au=Liu%2C+Ruotian&rft.au=Mangini%2C+Agostino+Marcello&rft.au=Fanti%2C+Maria+Pia&rft.date=2025-08-01&rft.issn=2329-9266&rft.eissn=2329-9274&rft.volume=12&rft.issue=8&rft.spage=1661&rft.epage=1672&rft_id=info:doi/10.1109%2FJAS.2025.125156&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JAS_2025_125156 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2329-9266&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2329-9266&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2329-9266&client=summon |