2017
DOI: 10.1109/maes.2017.160047
|View full text |Cite
|
Sign up to set email alerts
|

Security of SCADA systems against cyber–physical attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(17 citation statements)
references
References 63 publications
0
17
0
Order By: Relevance
“…The time required for (1) can be depreciated for the efficient target adversary. However, Tasks (2) and 3involve tasks that require in the order of several minutes to be performed.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…The time required for (1) can be depreciated for the efficient target adversary. However, Tasks (2) and 3involve tasks that require in the order of several minutes to be performed.…”
Section: Remarkmentioning
confidence: 99%
“…The controllers coordinate the action of the system in a distributed way by receiving information and sending commands. Resilience is especially relevant in these systems, since attacks can manifest significant physical effects [2]. For example, cyber-physical attacks may lead to negative impact on human safety, cause harm in natural environments, interrupt industrial process continuity; leading to large economic losses, generating legal problems and damaging the reputation of the affected organizations.…”
Section: Introductionmentioning
confidence: 99%
“…Among the many types of cyber attacks, there are two main categories that have been widely studied: false data injection attacks and denial of service (DoS) attacks. There are fruitful results dealing with such a type of attacks in different cyber-physical systems, see, e. g., [4,10,15,31,32] and the references therein. The latter is a more common and easy-to-implement type of attacks, mainly causing congestion in the communication network and resulting in prevented data exchanges or data losses among distributed system components [27,35].…”
Section: Doi: 1014736/kyb-2020-2-0340mentioning
confidence: 99%
“…Page's cumulative sum (CUSUM) algorithm is the best-known technique to tackle this type of problem. There are 6 selected primary stud-ies, that propose or use a CUSUM-based attack detection schemes ( Huang et al, 2010;Yang et al, 2014;Cáardenas et al, 2011;Do et al, 2015 ). There are also 28 (20.3%) studies that propose other novel anomaly detection approaches, some of which are considered together with the performance index test and/or normalized residual test.…”
Section: Anomaly Detectormentioning
confidence: 99%