Attack Graph Implementation and Visualization for Cyber Physical Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of Attack-Resilient Cyber-Physical Systems

In recent years, we have witnessed a significant increase in the number of security related incidents in control systems. These include high-profile attacks in a wide range of application domains – from attacks on critical infrastructure, as in the case of the Maroochy Water breach [1], and industrial systems (e.g., the StuxNet virus attack on an industrial SCADA system [2], [3]), to attacks on...

متن کامل

Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems

The increase in network connectivity has also resulted in several high-profile attacks on cyber-physical systems. An attacker that manages to access a local network could remotely affect control performance by tampering with sensor measurements delivered to the controller. Recent results have shown that with network-based attacks, such as Man-in-the-Middle attacks, the attacker can introduce an...

متن کامل

Sound conformance testing for cyber-physical systems: Theory and implementation

Conformance testing is a formal and structured approach to verifying system correctness. We propose a conformance testing algorithm for cyber-physical systems, based on the notion of hybrid conformance by Abbas and Fainekos. We show how the dynamics of system specification and the sampling rate play an essential role in making sound verdicts. We specify and prove error bounds that lead to sound...

متن کامل

Optimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems∗

Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...

متن کامل

dr0wned - Cyber-Physical Attack with Additive Manufacturing

Additive Manufacturing (AM, or 3D printing) is an emerging manufacturing technology with far-reaching implications. AM is increasingly used to produce functional parts, including components for safety-critical systems. However, AM’s unique capabilities and dependence on computerization raise a concern that an AM generated part could be sabotaged by a cyber-physical attack. In this paper, we dem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Processes

سال: 2019

ISSN: 2227-9717

DOI: 10.3390/pr8010012