2016
DOI: 10.1016/j.cose.2016.01.001
|View full text |Cite
|
Sign up to set email alerts
|

False sequential logic attack on SCADA system and its physical impact analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 66 publications
(40 citation statements)
references
References 17 publications
0
40
0
Order By: Relevance
“…The principal function of SCADA is acquiring the data from devices such as valves, pumps, etc. and providing control of all of these devices using a host software platform (Li et al (2016);…”
Section: Page 4 Of 42mentioning
confidence: 99%
See 1 more Smart Citation
“…The principal function of SCADA is acquiring the data from devices such as valves, pumps, etc. and providing control of all of these devices using a host software platform (Li et al (2016);…”
Section: Page 4 Of 42mentioning
confidence: 99%
“…The principal function of SCADA is acquiring the data from devices such as valves, pumps, etc. and providing control of all of these devices using a host software platform (Li et al (2016);Schneider Electric (2012)). The monitoring of the process is provided using a remote method of capturing data and alarm events, where instruments can be regulated and turned on and off at the right time.…”
mentioning
confidence: 99%
“…In this paper, we consider a highly-skilled attacker able to gain the access of a SCADA network and to disrupt the physical process before the intrusion is detected by sending syntactically and semantically valid command but with an harmful power due to their sequence. A false logic attack, as in [11,10], is invisible to most of the Intrusion Detection Systems (IDSs), because it uses well-formed packets with a content that is allowed even if a logic constraint is violated. An example of false logic attack is a sequence of opening and closing commands to a valve.…”
Section: Introductionmentioning
confidence: 99%
“…[24] enumerated all regular behaviors of the field devices, the detection system regarded whether the system would reach the critical state as the estimation criteria. Li W. et al [25] considered the control data were the most direct and key factors that influenced the behavior of the physical processes, and focused on control sequences to analyze the false sequential logic attacks.…”
Section: A Anomaly Detection In Icpssmentioning
confidence: 99%