Shielding Critical Systems: A New Defense Against Stealthy Cyberattacks

Author: Denis Avetisyan


Researchers have developed a dynamic coding scheme to proactively prevent covert attacks targeting the sensitive control mechanisms of cyber-physical systems.

A dynamic coding scheme effectively conceals cyber-attacks, rendering them undetectable through conventional means and establishing a robust defense against malicious intrusions.
A dynamic coding scheme effectively conceals cyber-attacks, rendering them undetectable through conventional means and establishing a robust defense against malicious intrusions.

This review details a method for disrupting attacker controllability through minimal secure communication channels, enhancing resilience in critical infrastructure.

Cyber-physical systems, while offering increased automation and efficiency, remain vulnerable to subtle, difficult-to-detect attacks. This paper, ‘A Dynamic Coding Scheme to Prevent Covert Cyber-Attacks in Cyber-Physical Systems’, addresses the conditions under which adversaries can successfully execute these covert attacks by exploiting system communication channels. We then introduce a dynamic coding scheme-requiring only minimal secure communication-that effectively disrupts an attacker’s ability to remain undetected. Could this approach represent a foundational step towards more resilient and secure critical infrastructure?


The Expanding Attack Surface of Cyber-Physical Systems

Cyber-physical systems, the intricate networks merging computation with physical processes, are rapidly becoming foundational to critical infrastructure – from power grids and transportation networks to healthcare and manufacturing. This proliferation, however, introduces expanding attack surfaces vulnerable to increasingly sophisticated threats. Traditional cybersecurity measures, designed to detect malicious code or flag anomalous network traffic, often prove ineffective against subtle manipulations of system inputs. These attacks don’t necessarily aim to disrupt operations with overt failures; instead, they can introduce carefully crafted biases or drifts in performance that bypass standard alarm thresholds. The challenge lies in the fact that these systems are designed to operate within a certain range of parameters, and attackers exploit this by remaining within those boundaries while still achieving malicious objectives – a form of covert action that necessitates a new approach to detection and defense.

Cyber-attacks on critical infrastructure are evolving beyond disruptive data breaches to encompass subtle manipulations of physical processes themselves. These covert attacks target the inputs of cyber-physical systems, cleverly altering commands or data streams without causing immediate, obvious anomalies in sensor readings. Instead of triggering alarms, malicious actors can induce gradual performance degradation, safety hazards, or even systemic failures that are difficult to attribute to external compromise. This is achieved by exploiting the inherent feedback loops and control mechanisms within these systems; attackers don’t necessarily need to break the system, but rather to nudge it towards undesirable states through carefully crafted inputs. The danger lies in the potential for prolonged, undetected operation, allowing attackers to achieve their goals – from economic gain to physical damage – before defenses can react effectively.

A comprehensive understanding of cyber-physical system (CPS) dynamics is paramount in uncovering hidden vulnerabilities to attack. Representing a CPS using state-space models – a mathematical description of its possible states and how they evolve over time – allows security analysts to move beyond simply monitoring sensor outputs. This approach reveals how subtle manipulations of system inputs can propagate through the system’s internal states, potentially leading to malicious outcomes without triggering traditional anomaly detection. By analyzing the system’s state transition matrix, researchers can identify ‘attack surfaces’ – specific input combinations that allow adversaries to steer the system into undesirable states. This methodology facilitates the development of more robust control algorithms and intrusion detection systems capable of anticipating and mitigating these sophisticated, state-level attacks, moving beyond perimeter defenses to address internal system weaknesses.

The widespread adoption of linear time-invariant (LTI) system models in the design of cyber-physical systems, while simplifying development and analysis, inadvertently introduces vulnerabilities exploitable by sophisticated attackers. These models, representing systems with predictable, proportional responses, allow adversaries to precisely calculate input manipulations that yield desired, yet malicious, outcomes without causing detectable anomalies. An attacker can craft subtle perturbations – often imperceptible amidst normal operational noise – to the system’s inputs, leveraging the known dynamics to steer the CPS toward a compromised state. This is particularly concerning because traditional intrusion detection systems frequently rely on monitoring sensor readings for deviations from expected behavior; carefully constructed attacks based on LTI models can bypass these defenses by maintaining sensor values within acceptable ranges while still achieving the attacker’s objectives. The predictability afforded by these models, therefore, transforms a design convenience into a potential security weakness, demanding a re-evaluation of CPS security paradigms.

A covert cyber-attack has compromised actuators 2, 3, and 4, as well as sensor 1.
A covert cyber-attack has compromised actuators 2, 3, and 4, as well as sensor 1.

Deconstructing Covert Attack Mechanisms: A Mathematical Perspective

The controllability matrix of a Cyber-Physical System (CPS) defines the set of states that can be reached from an initial state through permissible control inputs. Successful covert attacks leverage this matrix to identify inputs that yield minimal observable effect on the system’s outputs. Specifically, attackers analyze the matrix to determine which control signals have a limited influence on measurable system variables, effectively allowing manipulation with a reduced risk of detection. This analysis focuses on identifying inputs that, when applied, result in changes confined to a small subspace of the state space, minimizing their impact on observable outputs and maximizing the likelihood of remaining undetected. The rank of the controllability matrix is a critical factor, as a lower rank indicates fewer controllable states and potentially more opportunities for covert manipulation.

Actuator attacks leverage the control inputs of a Cyber-Physical System (CPS) to induce subtle, often unnoticeable, changes in system behavior. The magnitude of this influence is directly correlated to the relative degree between the manipulated input and the observed output. Relative degree, defined as the difference between the input’s and output’s highest derivative orders in a system’s transfer function, determines how quickly the input affects the output; a higher relative degree implies a more delayed and potentially less observable impact. Consequently, attackers prioritize manipulating actuators connected to outputs with a high relative degree to minimize detection while still achieving a desired, albeit subtle, system influence. This allows for covert operations where the system appears to function normally, masking the malicious intent.

Markov parameters are utilized in the analysis of covert attacks by characterizing a control system’s impulse response, effectively describing the output resulting from a brief input change. These parameters, represented as a matrix where each element $h_{ij}(t)$ denotes the effect of input $j$ at time $0$ on output $i$ at time $t$, allow security analysts to model system behavior and predict potential vulnerabilities. Specifically, examining the magnitude and duration of these impulse responses reveals which inputs have minimal observable effect on the system’s outputs – a key characteristic exploited in covert attacks designed to remain undetected. The analysis of Markov parameters facilitates the identification of input-output pairings susceptible to manipulation, allowing for proactive security measures and vulnerability assessments.

Combined actuator and sensor attacks represent a significant escalation in covert threat sophistication. Attackers can manipulate actuators to induce subtle system changes, and simultaneously compromise sensors to mask these alterations or misrepresent the resulting state. This coordinated approach complicates detection, as expected outputs may not correspond to actual inputs, and standard anomaly detection algorithms can be evaded. The combination allows for the creation of deceptive scenarios where the system appears to function normally while undergoing malicious modification, potentially leading to long-term, undetected compromise or the creation of vulnerabilities for further exploitation. This strategy requires precise timing and a detailed understanding of the CPS’s input-output relationships to avoid triggering immediate alarms.

This scenario depicts a stealthy cyber-attack occurring while initial input and output communication channels are already compromised.
This scenario depicts a stealthy cyber-attack occurring while initial input and output communication channels are already compromised.

A Dynamic Coding Scheme for Enhanced Security: A Proactive Defense

A dynamic coding scheme is proposed as a security measure against covert cyber-attacks targeting industrial control systems. This scheme operates by transforming both input commands and output signals to obfuscate malicious data transmitted between the command-and-control network and the plant-level infrastructure. The core principle involves altering the representation of data in transit, making it difficult for an attacker to discern legitimate operations from unauthorized commands or to interpret manipulated process variables. By dynamically encoding and decoding signals, the scheme aims to disrupt the attacker’s ability to inject malicious payloads or extract sensitive information without detection, effectively increasing the complexity of a successful attack.

The proposed security scheme employs a distinct encoder-decoder architecture for signal transformation. The encoder, situated on the command-and-control system, modifies incoming signals prior to transmission. Conversely, a decoder on the plant side reconstructs the original signal from the transformed version. This process involves mapping input signals to a different representation, effectively obscuring the original data during transmission and requiring the attacker to circumvent both the encoding and decoding processes to successfully inject or extract information. The encoder and decoder are designed to operate in a synchronized manner, ensuring accurate signal reconstruction while maintaining the security benefits of data obfuscation.

The proposed dynamic coding scheme’s security is predicated on the reliable protection of specific communication channels; testing demonstrated that securing a single input channel and two output channels is sufficient to maintain the scheme’s effectiveness. This configuration allows for the obfuscation of malicious commands and the disruption of unauthorized data exfiltration. The results indicate that compromise of any single one of these three channels leads to a demonstrable reduction in the scheme’s ability to conceal malicious activity, while maintaining integrity across all three channels provides a robust defense against covert cyber-attacks. The scheme does not require securing all communication pathways, only these designated $1:2$ input-to-output channels.

The implementation of dynamic coding is intended to impede an attacker’s ability to leverage known system vulnerabilities for malicious purposes. This is achieved by obscuring the characteristics of both incoming commands and outgoing data, effectively raising the threshold for successful exploitation. Specifically, the dynamic coding scheme introduces variability into the signal transmission, making it significantly more difficult for an attacker to reliably identify and interpret malicious signals amidst legitimate communication. This disruption of signal clarity hinders the attacker’s ability to maintain a covert presence within the system and execute attacks without detection, thus improving overall system security.

This dynamic coding scheme utilizes an encoder output, uₖ, and a decoder output, u<sub>d</sub>(k), to process information.
This dynamic coding scheme utilizes an encoder output, uₖ, and a decoder output, ud(k), to process information.

Validation and Implications for Critical Infrastructure: Towards Resilient Systems

A rigorous evaluation of the dynamic coding scheme was conducted utilizing a flight control system, chosen as a compelling analog for the intricate cyber-physical systems prevalent in modern infrastructure. This selection was deliberate; flight controls embody the tight integration of computation, communication, and physical processes, mirroring the vulnerabilities found in power grids, water treatment facilities, and transportation networks. The system’s complexity, involving numerous interacting components and real-time constraints, provided a demanding testbed to assess the scheme’s efficacy under realistic operational conditions. By focusing on this representative example, researchers aimed to demonstrate not merely theoretical resilience, but practical applicability to the safeguarding of essential services and critical national assets.

Evaluations revealed that the dynamic coding scheme demonstrably lessens the consequences of insidious cyber-attacks, substantially bolstering system resilience. Unlike traditional security measures that often react to detected intrusions, this scheme proactively minimizes the potential for damage even when malicious code operates undetected within the system. Through continuous code alteration and redundancy, the scheme limits the attacker’s ability to manipulate core functionalities or induce catastrophic failures. The impact of successful, yet covert, breaches is therefore contained, preventing cascading effects and maintaining critical operational capacity. This heightened resilience is particularly crucial for complex cyber-physical systems where undetected anomalies can lead to significant safety or economic consequences, offering a robust defense against evolving cyber threats.

Unlike traditional cybersecurity measures that primarily react to detected threats, this dynamic coding scheme operates as a proactive defense. By continuously adapting system code and introducing subtle, unpredictable variations, the scheme preemptively disrupts the attacker’s ability to establish a stable foothold. This isn’t about preventing initial intrusion – it’s about denying the attacker the consistent, predictable environment needed to execute a malicious plan. The system essentially creates a moving target, forcing attackers to constantly re-calibrate and increasing the likelihood of detection or, more critically, causing the attack to simply fail before it can manifest as a tangible system failure. This anticipatory approach is particularly vital for critical infrastructure, where even brief disruptions can have cascading and severe consequences, and shifts the paradigm from reactive damage control to preventative risk mitigation.

The demonstrated efficacy of this dynamic coding scheme extends far beyond the flight control system on which it was initially tested, offering a substantial advancement in the safeguarding of critical infrastructure. Sectors reliant on complex cyber-physical systems – including power grids, water treatment facilities, and transportation networks – stand to benefit from a proactive defense against increasingly sophisticated covert cyber-attacks. By mitigating risks before they escalate into observable failures, this approach shifts the paradigm from reactive incident response to preventative security. The scheme’s adaptability suggests potential implementation across diverse operational technologies, bolstering resilience and minimizing the potential for cascading failures that could disrupt essential services and compromise public safety. This represents a significant step towards a more secure and reliable foundation for the nation’s vital infrastructure.

The pursuit of secure cyber-physical systems demands a rigorous approach to vulnerability assessment, much like establishing axiomatic truths. This paper’s dynamic coding scheme, designed to thwart covert attacks, aligns with this principle. It’s not merely about detecting anomalies, but actively disrupting the attacker’s capacity for stealth. As Thomas Hobbes observed, “There is no such thing as absolute certainty, but only probability.” This echoes in the probabilistic nature of attack detection; the scheme doesn’t guarantee absolute prevention, but dramatically increases the likelihood of exposing malicious intent by introducing controlled disruptions to the system’s input/output behavior. The mathematical underpinnings of the coding scheme, and its focus on controllability, offer a demonstrable path towards bolstering system resilience.

Beyond Detection: Charting a Course for Resilience

The presented work, while addressing the critical vulnerability of cyber-physical systems to subtle manipulation, merely scratches the surface of a deeper, more fundamental problem. The efficacy of the dynamic coding scheme rests on the assumption that an attacker’s actions, however covert, manifest as deviations from a predictable input/output relationship. This is, of course, an elegant simplification. True stealth does not announce itself; it becomes the expected behavior. Future efforts must therefore move beyond mere detection – a reactive posture – and embrace provable system resilience. The pursuit of absolute security is futile; the goal should be to design systems that degrade gracefully even under successful attack, maintaining a core functionality defined by mathematical necessity, not empirical observation.

A key limitation lies in the scalability of this approach. While the minimal secure communication channels are a commendable optimization, the computational burden of constantly verifying system states will inevitably increase with complexity. A more fruitful avenue of research may lie in exploring the application of formal methods – specifically, runtime verification techniques grounded in temporal logic – to guarantee safety properties even in the presence of imperfect information. Such an approach would shift the focus from detecting anomalies to proving the absence of undesirable states.

Ultimately, the true test of this work-and indeed, the entire field of cyber-physical security-will not be the cleverness of attack detection algorithms, but the elegance of system design. A system built on principles of mathematical purity, where every operation serves a demonstrable purpose, is not merely secure; it is, in a very real sense, invulnerable to the chaos of unforeseen circumstances. The harmony of symmetry and necessity, after all, is a more enduring defense than any ad-hoc solution.


Original article: https://arxiv.org/pdf/2512.08134.pdf

Contact the author: https://www.linkedin.com/in/avetisyan/

See also:

2025-12-10 21:51