IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society 2017
DOI: 10.1109/iecon.2017.8216596
|View full text |Cite
|
Sign up to set email alerts
|

Statistical detection and isolation of cyber-physical attacks on SCADA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Cyber attacks are classified in two general groups [10]- [12]: i) denial-of-service (DoS); and ii) integrity attacks. The main purpose of DoS attacks is to deny access to sensor or actuator information; mathematical models for these kind of attacks are summarized in [13]. Integrity attacks are characterized by the modification of sensor and/or actuator information, compromising their integrity.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks are classified in two general groups [10]- [12]: i) denial-of-service (DoS); and ii) integrity attacks. The main purpose of DoS attacks is to deny access to sensor or actuator information; mathematical models for these kind of attacks are summarized in [13]. Integrity attacks are characterized by the modification of sensor and/or actuator information, compromising their integrity.…”
Section: Introductionmentioning
confidence: 99%
“…If we denote this desired tolerance as , the only required change in the algorithm is to replace the threshold ( In this section, we present an application of our algorithm for cybersecurity. We focus here on industrial control systems, comprising a physical process controlled by programmable logic controllers with sensors and actuators to monitor and affect its physical components [8]. These systems are at the core of many critical infrastructures and can be high-value targets for attackers.…”
Section: A Methods Descriptionmentioning
confidence: 99%
“…Where: 𝑥 𝑘 ∈ ℝ 𝑛 is the process states; 𝑦 𝑘 ∈ ℝ 𝑚 is the sensor's output signal; 𝜔 𝑘 ∈ ℝ 𝑛 , 𝜔 𝑘 ∼ 𝑁(0, 𝑄) is white noise acted on state variable; 𝑣 𝑘 ∈ ℝ 𝑚 , 𝑣 𝑘 ∼ 𝑁(0, 𝑅) is gaussian noise, white noise that acted on sensors; 𝑅 > 0; 𝑄 ≥ 0 are covariance matrices of white noise; 𝑥 ̂𝑘 − , 𝑥 ̃𝑘 are estimations of the remote estimator's state when not assaulted and having assaulted , respectively; 𝐴 ∈ ℝ 𝑛×𝑛 , 𝐶 ∈ ℝ 𝑚×𝑚 are system matrices; 𝑃 ̄ is the estimation of the covariance at steady state; 𝑘 ∈ 𝑁 is the index of each variable. When having not attacked, it is easy to write the estimation of sensor output bias as in (2) [5], [17].…”
Section: Linear Attack K-l Cusum and Chi-squared Detection Algorithmsmentioning
confidence: 99%