2016 American Control Conference (ACC) 2016
DOI: 10.1109/acc.2016.7524930
|View full text |Cite
|
Sign up to set email alerts
|

Detection of replay attacks in cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(36 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…In replay attack, the attacker (usually a Man‐In‐The‐Middle) collects real information in the network to retransmit it later. This gives the opportunity to the attacker to disrupt the communication between 2 devices without triggering alerts . In flooding attack, a stream of packets is sent to fill the memory of the target (end device).…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In replay attack, the attacker (usually a Man‐In‐The‐Middle) collects real information in the network to retransmit it later. This gives the opportunity to the attacker to disrupt the communication between 2 devices without triggering alerts . In flooding attack, a stream of packets is sent to fill the memory of the target (end device).…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…This gives the opportunity to the attacker to disrupt the communication between 2 devices without triggering alerts. 33 In flooding attack, a stream of packets is sent to fill the memory of the target (end device). An attacker can reduce the delivery success from 80% to 90% to less than 40% if the attacker targets the shared medium with 10 times more than the normal traffic intensity.…”
Section: Online Testing Phasementioning
confidence: 99%
“…The optimal value γ of the robust reformulation (18) is indeed an indication whether the attack still remains stealthy in the dynamic setting, i.e., if γ > 0 then the optimal solutionN yields a diagnosis filter in the form of (14) which detects all the admissible attacks introduced in Definition 2.5. However, if γ = 0, then it implies that for any possible detectors (static or dynamic) there exists a stationary disruptive attack that remains stealthy.…”
Section: Robust Diagnosis Filter: Transient Behaviormentioning
confidence: 99%
“…Numerical results confirm that the proposed filter can successfully detect the DoS attacks. In regard with the replay attack, the articles [22,14] offer sufficient conditions under which plausible attacks may remain stealthy irrespective of the detection mechanism providing that the attacker has access all the necessary data channels and excite attack of stage 2 at a suitable time.…”
Section: 3b Other Types Of Attacksmentioning
confidence: 99%
“…Applying some techniques of non-cooperative stochastic games, Miao et al [23] designed a suboptimal switching control policy that balances control performance and the intrusion detection rate for replay attacks. Hoehn and Zhang [24] provided a novel technique via exciting the system in non-regular time intervals and signal processing to detect the replay attack. Other replay attack detection mechanisms have also been proposed in the literature [25].…”
Section: Literature Reviewmentioning
confidence: 99%