2005
DOI: 10.1109/tii.2005.844422
|View full text |Cite
|
Sign up to set email alerts
|

Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
68
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 209 publications
(69 citation statements)
references
References 14 publications
0
68
0
1
Order By: Relevance
“…In [18], the authors evaluate the impact of delay jitter and packet loss in an NCS under a Denial of Service (DoS) attack. The conception of such DoS attack does not take into account the models of the controller and physical plant of the attacked NCS (i.e.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18], the authors evaluate the impact of delay jitter and packet loss in an NCS under a Denial of Service (DoS) attack. The conception of such DoS attack does not take into account the models of the controller and physical plant of the attacked NCS (i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, to affect the physical process, the attacker arbitrarily floods the network, causing jitter and packet loss in the communication links of the NCS. In this tactic, the excess of packets in the network may reveal the attack, allowing the implementation of countermeasures such as packet filtering [18] or blocking the malicious traffic on its origin [19]. Additionally, as stated in [12], the arbitrary intervention in a system which the models are unknown may lead the plant to an extreme physical behavior, which is not desired if a physically covert [12] attack is intended.…”
Section: Related Workmentioning
confidence: 99%
“…Long et al [8] proposed two queuing models for the DoS attacks in order to obtain the packet delay jitter and the loss probability. Wang et al [9] studies the DoS attacks analytically by using a more general queue model, a two-dimensional embedded Markov chain, which can more accurately capture the dynamics of the actual DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The impact of DoS attacks was analyzed by Khan and Traore [167] on three parameters used for attack detection: response time, queue-growth-rate, and arrival rate. Two queueing models were proposed by Long et al [191] for the DoS attacks in order to measure packet loss probability, packet delay, and jitter. A generalized multi-class Erlang and Engset mixed-loss model was used by Huang et al [159] to analyze a network under DDoS attacks, and the model was later extended to analyze 3G wireless cellular networks [160].…”
Section: Markovian Based Queuing Analysis Modelmentioning
confidence: 99%