2014 IEEE Conference on Control Applications (CCA) 2014
DOI: 10.1109/cca.2014.6981373
|View full text |Cite
|
Sign up to set email alerts
|

A statistical method for detecting cyber/physical attacks on SCADA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…The matrix E in (1) is singular due to the presence of algebraic equations, therefore it is necessary to transform the system into a non-singular form. This can be achieved by exploiting specific results from index-one singular systems, as shown in [14], [15], to divide the state vector x into two subsets: the dynamic states indicated by x 1 ∈ R nt , and the algebraic states indicated by x 2 ∈ R (n−nt) , where n t is the number of tanks (the head of tanks are the dynamic states of the system). To achieve this, the dynamic states are rearranged and separated from the algebraic states, using the similarity transformation…”
Section: B Separation Of Dynamic and Algebraic Statesmentioning
confidence: 99%
“…The matrix E in (1) is singular due to the presence of algebraic equations, therefore it is necessary to transform the system into a non-singular form. This can be achieved by exploiting specific results from index-one singular systems, as shown in [14], [15], to divide the state vector x into two subsets: the dynamic states indicated by x 1 ∈ R nt , and the algebraic states indicated by x 2 ∈ R (n−nt) , where n t is the number of tanks (the head of tanks are the dynamic states of the system). To achieve this, the dynamic states are rearranged and separated from the algebraic states, using the similarity transformation…”
Section: B Separation Of Dynamic and Algebraic Statesmentioning
confidence: 99%
“…This suboptimal algorithm combines the watermark‐based detector proposed by Mo et al and the zero‐sum stochastic game proposed by Zhu and Başar . In the same way, Do et al formulated the attack detection problem as a transient changes detection problem in stochastic‐dynamical systems. This detector is based on the knowledge of the behavior of the system and its stochastic variations to detect data manipulation.…”
Section: Related Workmentioning
confidence: 99%
“…Arvani and Rao proposed a signal‐based intrusion detection model to identify anomalies in the information reported by the sensors of cyber‐physical systems. Do et al presented the use of statistical detection methods, to identify data manipulation over stochastic processes. The use of watermark‐based techniques are proposed by Mo et al and revisited by Rubio‐Hernan et al Next, we reexamine the watermark‐based techniques presented in the works of Mo et al and Rubio‐Hernan et al and show how to combine such techniques together with control strategy policies.…”
Section: Introductionmentioning
confidence: 99%
“…The assumed window size is settled toT = 300. The range of orders where the detection ratio does not increase drastically is [18,28]. If an adversary uses an order in this range, the detection ratio is not higher than 10%.…”
Section: Numerical Validation Of the Multi-watermark Detector Againstmentioning
confidence: 99%
“…In [17], Arvani et al describe a signal-based detector method, using discrete wavelet transformations. Do et al study in [18] strategies for handling cyber-physical attacks using statistical detection methods. Mo et al propose in [4,5] the use of watermark-based detection by adapting traditional failure detection mechanisms (e.g., detectors to handle faults and errors).…”
Section: Cyber-physical Attacksmentioning
confidence: 99%