2019
DOI: 10.1016/j.ress.2019.03.020
|View full text |Cite
|
Sign up to set email alerts
|

An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…The latter is attack who send messages and commands in an illegal time. After that, Sicard et al [13] proposed four kinds of attack pattern, defined as follows.…”
Section: Related Work a Semantic Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The latter is attack who send messages and commands in an illegal time. After that, Sicard et al [13] proposed four kinds of attack pattern, defined as follows.…”
Section: Related Work a Semantic Attackmentioning
confidence: 99%
“…The above classification did not express the actual scenarios perfectly, for instance, "Direct attacks" and "Over-soliciting attacks" referred to the attack effects, and did fail to explain any attack techniques. Meanwhile, "Sequential attacks" and "Temporal attacks" would lead to system to a critical state quickly, such as in the tank system [13], forcing "V3" open and "V5" closed as "Tank T5" is full, "Tank T5" would be overflow. Therefore, the pivotal research point of attack model focused on "attack patterns" or "attack effects" are not sufficient.…”
Section: Related Work a Semantic Attackmentioning
confidence: 99%
“…: IS Interactions (X) between factory perimeters They have been used since the second half of the 20 th century [13]. Inside this category, can be mentioned PLC (Programmable Logic Controllers), RTU (Remote Terminal Units) [14], IED (Intelligent Electronic Devices).…”
Section: Presence Of Is Interactionsmentioning
confidence: 99%
“…An innovative methodology was proposed by [13], and is based on the concept of "automation knowledge". This is a deepening of [40] from the same author.…”
Section: ) Behavioral Models and Critical State Distance Notion To Protect Industrial Control Systems A: Purposementioning
confidence: 99%
“…Cyber‐attacks have become a major threat to many modern systems and networks. For example, industrial control systems have been targeted by cyber‐attacks based on vulnerabilities in these systems and their environments or based on the equipment degradation . It is a challenging task to address dependence in cybersecurity models …”
Section: Introductionmentioning
confidence: 99%