ABSTRACT

In this chapter, we consider the RCS compromised by the intelligent DoS attacker, which can adjust its strategy according to the knowledge of the defender’s security profile. In the cyber layer, some IDSs are deployed to raise alarms once an anomaly behavior is detected such that it can be removed automatically. Thus, the DoS attackers have to go through the IDSs first before it can compromise the control system. When it comes to the underlying physical layer, H∞ minimax control is used to extenuate the external disturbance. The architecture of the RCS is shown in Figure 8.1, where the adversaries from both the cyber layer and physical layer are considered.