Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978388
|View full text |Cite
|
Sign up to set email alerts
|

Limiting the Impact of Stealthy Attacks on Industrial Control Systems

Abstract: While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
183
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 279 publications
(184 citation statements)
references
References 55 publications
1
183
0
Order By: Relevance
“…We present and discuss some peculiarities in the attack and residual signals. Furthermore the results obtained in our work are related to the results in [1]. Lastly we conclude our work and suggest some topics for future work.…”
Section: Discussionsupporting
confidence: 61%
See 3 more Smart Citations
“…We present and discuss some peculiarities in the attack and residual signals. Furthermore the results obtained in our work are related to the results in [1]. Lastly we conclude our work and suggest some topics for future work.…”
Section: Discussionsupporting
confidence: 61%
“…Note that the threshold does not depend on the actual threshold J D . Similar results are shown and used to design an attack in [1], when the detector is in steady state.…”
Section: Steady State Influence Of the Attackmentioning
confidence: 66%
See 2 more Smart Citations
“…Majority of work on attack detection has considered a single stage for attack and detection (e.g., see [18]). Here, we evaluate the situation of using multiple detectors throughout the process while carrying out a spoofing attack on only one point.…”
Section: Experimentation Setupmentioning
confidence: 99%