Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966959
|View full text |Cite
|
Sign up to set email alerts
|

Attacks against process control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 482 publications
(54 citation statements)
references
References 21 publications
0
53
0
Order By: Relevance
“…As intelligent cyber‐attacks are adaptive to the process and control system behavior, we may assume that they are as powerful as having access to the measurement feedback signals (sensor attack), the control command signals (actuator attack), or auxiliary information such as the threshold and bias parameters in detection methods such as CUSUM . Being process and controller behavior aware, the attacks will therefore have information on the stability region of the process under two‐tier control, as well as existing alarm triggers on the ideal operating window imposed on the input and output variables.…”
Section: Cyber‐attack Design and Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…As intelligent cyber‐attacks are adaptive to the process and control system behavior, we may assume that they are as powerful as having access to the measurement feedback signals (sensor attack), the control command signals (actuator attack), or auxiliary information such as the threshold and bias parameters in detection methods such as CUSUM . Being process and controller behavior aware, the attacks will therefore have information on the stability region of the process under two‐tier control, as well as existing alarm triggers on the ideal operating window imposed on the input and output variables.…”
Section: Cyber‐attack Design and Detectionmentioning
confidence: 99%
“…Intelligent cyber‐attacks are designed such that the controller is able to compute feasible control actions (i.e., the falsified state is not outside the closed‐loop stability region Ω ρ ), but have large enough magnitude of variations such that the control system will not be able to drive the process to its operating steady state. The four most important types of such attacks are considered below.…”
Section: Cyber‐attack Design and Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Traditional IT security mechanisms such as authentication and message integrity are insufficient for CPS security. However, as stated in [13], the major distinction of control systems with respect to other IT systems is the interaction with the physical world. In [25], the authors state that CPSs security is specifically concerned with attacks that cause physical impact; since IT security mechanisms do not usually account for the physical part of the system, they are thus ineffective against attacks that either target or exploit the physical components of CPSs.…”
Section: Quantitative Integrity Analysis On Cpsmentioning
confidence: 99%
“…Integrity attacks include stealthy attacks [19], message replay [36], covert attacks [50], and false-data injection [37], among others. Due to their focus on fault-detection techniques, many results based on control theory aim to protect CPSs from integrity attacks by relying on monitoring the physics of the system to detect anomalies (see, e.g., [5,13,35,38,44,52]).…”
Section: Introductionmentioning
confidence: 99%