Recovery of Structural Controllability into Critical Infrastructures under Malicious Attacks
نویسندگان
چکیده
منابع مشابه
Cyber Stealth Attacks in Critical Information Infrastructures
Current Critical Infrastructures (CIs) are complex interconnected industrial systems that, in recent years, have incorporated information and communications technologies such as connection to the Internet and commercial off-the-shelf components. This makes them easier to operate and maintain, but exposes them to the threats and attacks that inundate conventional networks and systems. This paper...
متن کاملRecovery of Structural Controllability for Control Systems
Two of the fundamental problems of control systems theory are controllability and observability, and designing control systems so that these properties can be satisfied or approximated sufficiently. However, it is prudent to assume that attackers will not only be able to subvert measurements but also control. Moreover, advanced adversaries with an understanding of the control system may seek to...
متن کاملModel-Based Evaluation of the Resilience of Critical Infrastructures Under Cyber Attacks
In this paper we report recent results on modelling the impact of cyber-attacks on the resilience of complex industrial systems. We use a hybrid model of the system under study in which the accidental failures and the malicious behaviour of the Adversary are modelled stochastically, while the consequences of failures and attacks are modelled in detail using deterministic models. This modelling ...
متن کاملSimulative Evaluation of Security Attacks in Networked Critical Infrastructures
ICT is becoming a fundamental and pervasive component of critical infrastructures (CIs). Despite the advantages that it brings about, ICT also exposes CIs to a number of security attacks that can severely compromise human safety, service availability and business interests. Although it is vital to ensure an adequate level of security, it is practically infeasible to counteract all possible atta...
متن کاملRobustness of the RaptorQ FEC Code Under Malicious Attacks
The RaptorQ code is the most advanced standardised fountain code. Its properties make it very attractive for forward error correction, offering great reliability even at low overheads (i.e., for a small amount of repair information), but also admirable encoding and decoding performance. Since the code is relatively recent and the standard is complex, we are in the process of developing the firs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2020
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2020.0110493