2019
DOI: 10.1016/j.ijcip.2019.05.001
|View full text |Cite
|
Sign up to set email alerts
|

A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…For those reasons, we chose to use DNNs that are more flexible on both counts. Specification-based system modeling can also be very effective, as shown by [33] and [7]. In [33], the authors used behavior rules to specify the safe system state for medical Cyber Physical Systems (CPSs) and monitor deviation from these rules.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…For those reasons, we chose to use DNNs that are more flexible on both counts. Specification-based system modeling can also be very effective, as shown by [33] and [7]. In [33], the authors used behavior rules to specify the safe system state for medical Cyber Physical Systems (CPSs) and monitor deviation from these rules.…”
Section: Related Workmentioning
confidence: 99%
“…The WADI dataset was made public recently, and very few attack detection results utilizing this dataset have been published. In [7], the authors proposed an agent-based framework for CPS modeling and used it to detect attacks on the WADI dataset. Unfortunately, the authors of [7] did not publish the quantitative metrics of the detection results, only reporting that 12 of 16 attacks were detected.…”
Section: Wadimentioning
confidence: 99%
See 2 more Smart Citations
“…Requiring development of invariants, an information execution flow across these domains starting from source to destination is monitored to identify when vulnerabilities that have been exploited have resulted in invariant violation. Mishra et al [108] proposed an agent-based modelling framework to model critical CPS and their interdependencies, to understand the impact of attacks on interconnected critical infrastructures; they evaluated the application of the model to a water distribution system and used invariant-based method [70] to generate rules to detect attacks.…”
Section: Model-based Security Analysismentioning
confidence: 99%