2023
DOI: 10.3390/s23052778
|View full text |Cite
|
Sign up to set email alerts
|

Controller Cyber-Attack Detection and Isolation

Abstract: This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of control loop performance methods developed in the automation community are used to diagnose these anomalies. An integration of both approaches is proposed, whic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…To move to the probabilistic form (3), let's write (6) in the form (7) 6. Let's write by replacing Z i in (7) with and get the function of the probability of success of the attack scenario J : J 7. Based on relation (8) and the known probabilities of capturing objects , we will calculate a set of criteria for the probability of success of network attack scenarios J , J , …, J for each of possible attacks ; 8.…”
Section: Logical and Probabilistic Criterion For The Probability Of S...mentioning
confidence: 99%
See 1 more Smart Citation
“…To move to the probabilistic form (3), let's write (6) in the form (7) 6. Let's write by replacing Z i in (7) with and get the function of the probability of success of the attack scenario J : J 7. Based on relation (8) and the known probabilities of capturing objects , we will calculate a set of criteria for the probability of success of network attack scenarios J , J , …, J for each of possible attacks ; 8.…”
Section: Logical and Probabilistic Criterion For The Probability Of S...mentioning
confidence: 99%
“…Therefore, a lot of research is devoted to the issue of analyzing attack scenarios. In works [5]- [7], scenarios of attacks on ICS are analyzed, various approaches to the implementation of such attacks are considered. When analyzing scenarios, it is important to choose a methodology for describing attacks on information systems, in particular methods for describing trajectories and quantifying the effectiveness of attacks.…”
Section: Introductionmentioning
confidence: 99%