2016 24th Iranian Conference on Electrical Engineering (ICEE) 2016
DOI: 10.1109/iraniancee.2016.7585614
|View full text |Cite
|
Sign up to set email alerts
|

Attack detection in active queue management within large-scale networks control system with information of network and physical system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Dynamic access control [83] is a mechanism that is heavily dependent on malicious node assumption to design advanced collision attacks called random poisoning [84]. Other studies used a mathematical model [85], unknown input observers [86], Dynamic Host Configuration Protocol DHCP starvation attack and Transmission Control Protocol TCP [87][88][89], simple statistical measures [90], and Bayesian network model to predict insider threats [91].…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…Dynamic access control [83] is a mechanism that is heavily dependent on malicious node assumption to design advanced collision attacks called random poisoning [84]. Other studies used a mathematical model [85], unknown input observers [86], Dynamic Host Configuration Protocol DHCP starvation attack and Transmission Control Protocol TCP [87][88][89], simple statistical measures [90], and Bayesian network model to predict insider threats [91].…”
Section: Cyber Activity Behaviormentioning
confidence: 99%
“…Most of the previous works did not use both behaviors of the cyber and physical systems in analyzing insider threat detections. The majority of scholars aim to detect insiders by observing behaviors either from the cybersecurity or physical security aspects [86]. However, in terms of detecting physical threats, most of the existing studies applied physical access control mechanisms that may control the physical access of unauthorized users to a certain point.…”
Section: Physical and Cyber Behaviormentioning
confidence: 99%