2020
DOI: 10.1109/access.2020.2977423
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Network Attacks on Cyber-Physical Systems

Abstract: A cyber-physical system (CPS) typically consists of the plant, sensors, actuators, the controller and a communication network. The communication network connects the individual components to achieve the computing and communication in the CPS. It also makes the CPS vulnerable to network attacks. How to deal with the network attacks in CPSs has become a research hotspot. This paper surveys the types of network attacks in CPSs, the intrusion detection methods and the attack defense strategies. The future research… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 90 publications
(35 citation statements)
references
References 76 publications
0
35
0
Order By: Relevance
“…Although has been proven by experts that machine learning models can detect [3,5,9,10,13,20,29,33] most types of cyberattacks with high performances, the mechanics that affect accuracy are not usually analyzed and discussed. Also, building performant machine learning models require large datasets of labeled instances [16,30].…”
Section: Introductionmentioning
confidence: 99%
“…Although has been proven by experts that machine learning models can detect [3,5,9,10,13,20,29,33] most types of cyberattacks with high performances, the mechanics that affect accuracy are not usually analyzed and discussed. Also, building performant machine learning models require large datasets of labeled instances [16,30].…”
Section: Introductionmentioning
confidence: 99%
“…The 2 nd CPS threat factors threat the target: the CPS applications and their users or components [109]. The 3 rd factor of the CPS threats is the motive of the danger in which the CPS assailants have reason to make an attack, e.g., spying, cyberwar, or criminal [110]. The 4 th factor of the CPS threats is the threat vector, which can do one of four mechanisms for a successful attack, e.g., alteration, disruption, fabrication, and interception.…”
Section: A General Cps Threats Factorsmentioning
confidence: 99%
“…This work copes with threats that may arise in the communication channel. A survey about network attacks in CPS is presented in [8]. The key idea of the proposed method is to design a secure control system capable of detecting the injection of tampered data (known as deception attack).…”
Section: Introductionmentioning
confidence: 99%