2016 IEEE Conference on Control Applications (CCA) 2016
DOI: 10.1109/cca.2016.7587875
|View full text |Cite
|
Sign up to set email alerts
|

CUSUM and chi-squared attack detection of compromised sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
70
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 73 publications
(70 citation statements)
references
References 18 publications
0
70
0
Order By: Relevance
“…Indeed, because many design assumptions are no longer valid when perturbations to the system are caused by an adversarial attacker rather than random or structured failures, DDoS attacks toward CPS are a rising threat . Several CUSUM‐based algorithms have been proposed for detecting attacks toward CPS, in particular supervisory control and data acquisition (SCADA) systems, power system lines, and smart grids , …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, because many design assumptions are no longer valid when perturbations to the system are caused by an adversarial attacker rather than random or structured failures, DDoS attacks toward CPS are a rising threat . Several CUSUM‐based algorithms have been proposed for detecting attacks toward CPS, in particular supervisory control and data acquisition (SCADA) systems, power system lines, and smart grids , …”
Section: Introductionmentioning
confidence: 99%
“…10 Indeed, because many design assumptions are no longer valid when perturbations to the system are caused by an adversarial attacker rather than random or structured failures, 11 DDoS attacks toward CPS are a rising threat. 12 Several CUSUM-based algorithms have been proposed for detecting attacks toward CPS, [13][14][15] in particular supervisory control and data acquisition (SCADA) systems, 16 power system lines, 17 and smart grids. 18,19 In this letter, we capitalize on recent results appeared in the statistics literature, [20][21][22] which we believe pave the way for more effective algorithms in the application contexts described earlier.…”
Section: Introductionmentioning
confidence: 99%
“…The work in [22] demonstrated that replay attacks eluded conventional χ 2 tests and proposed a new Linear Quadratic Gaussian (LQG) controller to process the residuals which eventually led to detection. [23] investigated the statistical consistency of residuals using the CUSUM procedure. Other researchers [24,25] have proposed ways to estimate state parameters under cyberattacks.…”
Section: Related Workmentioning
confidence: 99%
“…Proposition 1. [Murguia and Ruths (2016b)]. Assume that there are no attacks on the system and consider the chisquared procedure (11) with residual r k ∼ N (0, Σ) and threshold α ∈ R >0 .…”
Section: False Alarmsmentioning
confidence: 99%