2023
DOI: 10.1061/jwrmd5.wreng-5854
|View full text |Cite
|
Sign up to set email alerts
|

High-Fidelity Cyber and Physical Simulation of Water Distribution Systems. II: Enabling Cyber-Physical Attack Localization

Abstract: A fundamental problem in the realm of cyber-physical security of smart water networks is attack detection, a key step towards designing adequate countermeasures. This task is typically carried out by algorithms that analyze time series of process data. However, the nature of the data available to develop these algorithms limits their capabilities: by relying on process data only, one cannot distinguish a cyber-attack from the failure of a system's component or identify the root cause of an attack. Here, we sho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…scheduling (Di Nardo et al 2021). As we shall see in the companion paper (Murillo et al 2022), DAHLSIM simulation of the full protocol stack also broadens the opportunities available for research in cyber-security (Tables 3 and 4). Although validating network traffic was out of the scope of this paper, we believe that further research in this field could help to develop better and more accurate experimentation platforms for CPS.…”
Section: Discussionmentioning
confidence: 96%
See 3 more Smart Citations
“…scheduling (Di Nardo et al 2021). As we shall see in the companion paper (Murillo et al 2022), DAHLSIM simulation of the full protocol stack also broadens the opportunities available for research in cyber-security (Tables 3 and 4). Although validating network traffic was out of the scope of this paper, we believe that further research in this field could help to develop better and more accurate experimentation platforms for CPS.…”
Section: Discussionmentioning
confidence: 96%
“…• Attacks Configuration file: Attacks are configured in this optional file. Our companion paper (Murillo et al 2022) delves into the details of attacks and their implementation.…”
Section: Parsermentioning
confidence: 99%
See 2 more Smart Citations
“…For a comprehensive risk assessment, it’s essential to contemplate diverse attack modalities to reveal all potential vulnerabilities in a cyber‐physical system. Prior investigations in water distribution systems have developed platforms that assess a spectrum of attack vectors, both on process and traffic data (Murillo et al., 2023; Taormina et al., 2019). These can set a precedent for subsequent endeavors in stormwater systems.…”
Section: Discussionmentioning
confidence: 99%