Performance and Resilience of Cyber-Physical Control Systems With Reactive Attack Mitigation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilience of Process Control Systems to Cyber-Physical Attacks

In this work we investigate the matter of “secure control” – a novel research direction capturing security objectives specific to Industrial Control Systems (ICS). We provide an empirical analysis of the well known Tennessee Eastman process control challenge problem to gain insights into the behavior of a physical process when confronted with cyber-physical attacks. In particular, we investigat...

متن کامل

Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems: Modeling, Resilient Estimation and Attack Mitigation

In this paper, we consider the problem of attack-resilient state estimation, that is to reliably estimate the true system states despite two classes of attacks: (i) attacks on the switching mechanisms and (ii) false data injection attacks on actuator and sensor signals, in the presence of unbounded stochastic process and measurement noise signals. We model the systems under attack as hidden mod...

متن کامل

Design and Implementation of Attack-Resilient Cyber-Physical Systems

In recent years, we have witnessed a significant increase in the number of security related incidents in control systems. These include high-profile attacks in a wide range of application domains – from attacks on critical infrastructure, as in the case of the Maroochy Water breach [1], and industrial systems (e.g., the StuxNet virus attack on an industrial SCADA system [2], [3]), to attacks on...

متن کامل

Reasoning about Attack Goals for Cyber Resilience

This paper describes our approach to anticipating and recognizing potential cyber threats in order to provide timely responses to those threats. Our approach anticipates attacks on distributed systems by generating a diverse set of attack plans on key system components and then determining the probabilities that these attacks may threaten those components or others that are stepping stones to t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Smart Grid

سال: 2019

ISSN: 1949-3053,1949-3061

DOI: 10.1109/tsg.2019.2909357