USING REINFORCEMENT LEARNING TO SPOOF A MONITORED KALMAN FILTER
Bonitz, Dylan A.
Wade, Brian M.
MetadataShow full item record
Modern hardware systems rely on state estimators such as Kalman filters to monitor key variables for feedback and performance monitoring. The performance of the hardware system can be monitored using a chi-squared fault detection test. Previous work has shown that Kalman filters are susceptible to false data injection attacks. In a false data injection attack, intentional noise and/or bias is added to sensor measurement data to mislead a Kalman filter in a way that goes undetected by the chi-squared test. This thesis proposes a method to deceive a Kalman filter where the attack data is generated using reinforcement learning. It is shown that reinforcement learning can be used to train an agent to manipulate the output of a Kalman filter via false data injection and without being detected by the chi-squared test. This result shows that machine learning can be used to successfully perform a cyber-physical attack by an actor who does not need to have in-depth knowledge and understanding of mathematics governing the operation of the target system. This result has significant real-world impact as modern smart power grids, aircraft, car, and spacecraft control systems are all cyber-physical systems that rely on trustworthy sensor data to function safely and reliably. A machine learning derived false data injection attack against any of these systems could lead to an undetected and potentially catastrophic failure.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Carnes, Joseph L. (Monterey, California: Naval Postgraduate School, 2015-06);A methodology for automatically detecting a swarm attack in the maritime domain is examined in this thesis. These techniques are based upon feeding data into the Kalman filtering algorithm, which is used in the tracking ...
Kersten, Philip (Monterey, California. Naval Postgraduate School, 2022-08); NPS-SP-22-010Today, robotic vehicles (RV) play an essential role in both modern industry and the military. More and more RVs become autonomously operated and are prone to cyber-attacks of their embedded control systems. These attacks ...
Beach, Timothy M. (Monterey, California: Naval Postgraduate School, 2013-06);An ad hoc unmanned ground vehicle (UGV) network operates as an intermittently connected mobile delay tolerant network (DTN). The path planning strategy in a DTN requires mobility estimation of the spatial positions of the ...