2021
DOI: 10.3390/sym13122425
|View full text |Cite
|
Sign up to set email alerts
|

Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring

Abstract: Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a security management system of CPS. It provides information to make a decision and generate a response. A large number of new methods are aimed at CPS security, including security assessment, intrusion detection, and ensuring sustainability. However, as a cyber-phy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…The introduction of IT into the IS management processes, and, in particular, into the organization of the IS Event Management processes of companies, helps to prevent potential losses. Taking into account the previous works [3,4,17,18,20,24], within the framework of building the company's ISMS, additions to the method of organizing the EM process were proposed, see Fig. 1.…”
Section: Methods and Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The introduction of IT into the IS management processes, and, in particular, into the organization of the IS Event Management processes of companies, helps to prevent potential losses. Taking into account the previous works [3,4,17,18,20,24], within the framework of building the company's ISMS, additions to the method of organizing the EM process were proposed, see Fig. 1.…”
Section: Methods and Modelsmentioning
confidence: 99%
“…And this, in turn, gives rise to inefficient use of the resources of the CIS defense side. And, more importantly, it can lead to a situation where important events in the context of information security can be overlooked by the company's IS analyst [20,21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Experimental study of intelligent home intrusion detection [124] For monitoring industrial systems, industrial cyber-physical systems (ICPSs) are used, consisting of a link between the software and hardware parts of the system. Reference [115] developed a methodology called Multilayer Run-Time Security Monitor (ML-RSM), which is capable of identifying divergences caused by communications and attacks on the application layer, as well as preventing the spread to other control layers.…”
Section: Cpsmentioning
confidence: 99%
“…Information security in the monitoring layer of the CPS is important to maintain data integrity. In this sense, Reference [124] proposes an adaptive method that analyzes and solves a multicriteria optimization problem where the available inputs are mutable, seeking to ensure data integrity.…”
Section: Cpsmentioning
confidence: 99%
See 1 more Smart Citation