2015
DOI: 10.1016/bs.adcom.2015.03.002
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Research on Data Corruption in Cyber–Physical Critical Infrastructure Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…The antennas on satellite stations and ground stations, as well as the systems connecting ground stations to satellite networks, are all potential entry points for hackers to launch cyberattacks [41]. Attacks that target data interception attempt to store data as it is transmitted through a satellite information system or eavesdrop the flow of data over the connected network [42]. An attacker will be able to verify the success of their security breach attempt in almost real-time, even if a satellite service provider is unaware of the attack while it is happening or even after it has occurred.…”
Section: Cyberattacks In Satellite Networkmentioning
confidence: 99%
“…The antennas on satellite stations and ground stations, as well as the systems connecting ground stations to satellite networks, are all potential entry points for hackers to launch cyberattacks [41]. Attacks that target data interception attempt to store data as it is transmitted through a satellite information system or eavesdrop the flow of data over the connected network [42]. An attacker will be able to verify the success of their security breach attempt in almost real-time, even if a satellite service provider is unaware of the attack while it is happening or even after it has occurred.…”
Section: Cyberattacks In Satellite Networkmentioning
confidence: 99%
“…CPS security concerns comprise the malicious attempts-attacks-by an adversary to intercept, disrupt, defect or fail cyber-physical systems [5]. Depending on the source of attacks, CPS can be cyber, physical, or cyber-physical [17]. This study is focussed on cyber attacks, which result in deliberate sensor data corruption.…”
Section: B Threats To Validitymentioning
confidence: 99%
“…A survey of research on data corruption in critical infrastructure is presented in [17] that describes various anomaly detection approaches for detection of corrupted data. Statistical and behavioural approaches can be used for this purpose.…”
Section: B Threats To Validitymentioning
confidence: 99%