2015 World Congress on Industrial Control Systems Security (WCICSS) 2015
DOI: 10.1109/wcicss.2015.7420321
|View full text |Cite
|
Sign up to set email alerts
|

Attack-Tolerant networked control system based on the deception for the cyber-attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…The physical and economic impacts of cyberattacks on power systems have been discussed [35]- [38]. Thus, it is necessary to maintain the operation of control systems, even if the systems are under attack [39], [40]. To maintain normal operation during a cyberattack, methods to detect data tampering attacks with predicted values [41], [42] and to mitigate data tampering attacks by switching multiple controllers [43] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The physical and economic impacts of cyberattacks on power systems have been discussed [35]- [38]. Thus, it is necessary to maintain the operation of control systems, even if the systems are under attack [39], [40]. To maintain normal operation during a cyberattack, methods to detect data tampering attacks with predicted values [41], [42] and to mitigate data tampering attacks by switching multiple controllers [43] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with the passive form, active attack tolerance can deal with many types of unknown cyber-attacks, and reduces the conservativeness of the control strategy. Yaseen and Bayart (2016, 2017) and Zhang et al (2018) adopt the intelligent generalized predictive controller to detect, identify and distinguish faults and cyber-attacks, and design fault-tolerant and attack-tolerant strategy against faults, hijacking attacks and spoofing attacks respectively. Du et al (2018) use a convex optimization method to balance the sparsity and magnitude of attack vectors, such that attacks can be detected with high probability.…”
Section: Introductionmentioning
confidence: 99%
“…The attack-tolerant scheme for NCS was introduced in [16]; this scheme considered three types of attacks in NCS, these types are represented by injection, modification, and replication of the sent and received data in the networked control loop.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, a modification for the scheme in [16] will be adopted to handle the Stuxnet case. We specially focus on the controller hijacking attack with the injection of a destructive control signal into the networked control loop.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation