2018
DOI: 10.1109/jproc.2017.2725642
|View full text |Cite
|
Sign up to set email alerts
|

ARMET: Behavior-Based Secure and Resilient Industrial Control Systems

Abstract: diMiTrios serpanos, a nd howard shrobe cyber means alone was first demonstrated in the well-known Aurora experiment where a pure cyber attack successfully destroyed a diesel generator [2]; Stuxnet [3] and the recent Ukrainian smartgrid attack [4] as well as several additional less known incidents have demonstrated the potential of cyber attacks to inflict serious societal damage. Finally, ICSs may be compromised to serve as elements of a Botnet as the recent Mirai attack indicates [5]. To address reliability a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 59 publications
0
10
0
1
Order By: Relevance
“…Based on ARMET [16], we introduce our Multi-Layer Runtime Security Monitor (ML-RSM). The ML-RSM structure is given in Fig.…”
Section: Run-time Multi-layer Security Monitor Designmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on ARMET [16], we introduce our Multi-Layer Runtime Security Monitor (ML-RSM). The ML-RSM structure is given in Fig.…”
Section: Run-time Multi-layer Security Monitor Designmentioning
confidence: 99%
“…In contrast to the contemporary approaches, we handle the stealthy attacks based on a method that identifies the vulnerabilities in the system design [16], [36]. The method is iterative; the design will be refined until no vulnerabilities are identified, or the identified vulnerabilities are covered by the monitor.…”
Section: Stealthy Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…This is similar to ARMET and the concept of a Runtime Security Monitor, which detect data anomalies stemming from physical or cyber faults or attacks. 5,7 The shift in security-related processing from the local device to a remote server affords constrained, embedded system the same protection as a powerful general-purpose system at the expense of latency. In this manner, substantial computing power may help develop a system adaptive to emerging threats that would be infeasible to operate within the constraints of a low-cost IoT device.…”
Section: The Case For Cognitionmentioning
confidence: 99%
“…Moreover, implementing security features in smart grid is out of the scope of this paper as already a lot of work is done in this domain. In future, smart meter and electricity consumption profile of each user can be secured using ARMET [29] technology.…”
Section: Optimizing Electricity Load and Cost For Demand Side Management In Smart Gridmentioning
confidence: 99%