2019
DOI: 10.1016/j.ijcip.2019.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
3

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 33 publications
0
12
0
3
Order By: Relevance
“…Formula (3) does not take into account the combination of several threats, as well as the internal influence between IPT. Therefore, a more appropriate way to determine the risks for ICS is a method that is based on the preparation of attack profiles [3][4]. With this method, attack profiles are considered as sequences of attacks that consist of a combination of different threats [1][2][3][4].…”
Section: Methods and Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Formula (3) does not take into account the combination of several threats, as well as the internal influence between IPT. Therefore, a more appropriate way to determine the risks for ICS is a method that is based on the preparation of attack profiles [3][4]. With this method, attack profiles are considered as sequences of attacks that consist of a combination of different threats [1][2][3][4].…”
Section: Methods and Modelsmentioning
confidence: 99%
“…These researches are primarily intended to answer questions related to the solution of multi-criteria optimization problems that have such properties as: a complex configuration of the acceptable area of application of individual IPT; multi-extremeness of the considered functions; algorithmic definition of functions, etc. Moreover, in real-life problems of creating effective multi-circuit CS systems [3] - [4], it is rarely customary to evaluate solutions using a single criterion. Therefore, in such problems it is important not only to find acceptable Pareto-optimal solutions, but also to approximate the many variants obtained in order to offer the decision-maker (DM) an objective choice of IPT according to the corresponding CS circuits of ICS.…”
Section: Introductionmentioning
confidence: 99%
“…A comprehensive solution for ensuring the SCADA survivability is presented in [149]. The proposed solution is based on virtualization technologies in order to build a resilient communication infrastructure.…”
Section: Scada Survivability and Resiliencementioning
confidence: 99%
“…Reference [26] studies the applicability of emerging technologies in the area of IP networks, including SDN, NFV, and next generation firewalls, to secure ICS. Reference [27] proposes an attack detection and localization algorithm and designs an intervention strategy in the networked robot control field. A software-defined security approach to secure field zones in ICS is shown in Reference [28]: it consists of a hybrid anomaly detection module that inspects anomaly behaviors in network communications and physical process states.…”
Section: Software Defined Networkingmentioning
confidence: 99%