2017 American Control Conference (ACC) 2017
DOI: 10.23919/acc.2017.7963810
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of control system anomaly detectors

Abstract: Anomaly detectors in control systems are used to detect system faults and they are typically based on an analytical system model, which generates residual signals to find a fault. The detectors are designed to detect randomly occurring faults but not coordinated malicious attacks on the system. Therefore three different anomaly detectors, namely a detector solely based on the last residual, a multivariate exponentially weighted moving average filter and a cumulative sum, are investigated to determine which det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 32 publications
(23 citation statements)
references
References 17 publications
0
23
0
Order By: Relevance
“…Theorem 1 represents an interesting extension of the work on deterministic systems [19], which used the infinity norm based metric (8).…”
Section: B Solving Problemmentioning
confidence: 99%
See 3 more Smart Citations
“…Theorem 1 represents an interesting extension of the work on deterministic systems [19], which used the infinity norm based metric (8).…”
Section: B Solving Problemmentioning
confidence: 99%
“…In these studies, the reachable sets were predominantly used to characterize the impact, and algorithms for calculating upper and lower bounds of these sets were proposed in several works [8]- [10]. Other types of detectors have also been considered [14]- [19]. For example, Cárdenas et al considered a cumulative sum (CUSUM) detector, and investigated the impact of several attack strategies that remain undetected by this detector [14].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The design of stealthy adversaries was addressed in [10] and attack detectors in the form of network monitors were proposed in [11,12]. Residual-based state estimators are by far the most common way of detecting attacks on networked systems as it is shown in [13,14]. These detectors rely on the value of the estimation residue in order to decide whether or not the system is under attack.…”
Section: Introductionmentioning
confidence: 99%