2017
DOI: 10.1007/s11036-017-0943-5
|View full text |Cite
|
Sign up to set email alerts
|

Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…A vast collection of scientific literature about cybersecurity in Industrial Control Systems (ICS) is available, reporting security breaches in all major Real-Time Ethernet (RTE) protocols used in industry [21][22][23][24][25][26][27][28]. Therefore, considering the feasibility of occurring cyber-attacks against physical systems, as demonstrated by the real cases already reported in the literature [7,14,17], studies have been conducted aiming to characterize vulnerabilities and promote security solutions for NCSs [8,12,13,15,16,29].…”
Section: Physicalmentioning
confidence: 99%
See 4 more Smart Citations
“…A vast collection of scientific literature about cybersecurity in Industrial Control Systems (ICS) is available, reporting security breaches in all major Real-Time Ethernet (RTE) protocols used in industry [21][22][23][24][25][26][27][28]. Therefore, considering the feasibility of occurring cyber-attacks against physical systems, as demonstrated by the real cases already reported in the literature [7,14,17], studies have been conducted aiming to characterize vulnerabilities and promote security solutions for NCSs [8,12,13,15,16,29].…”
Section: Physicalmentioning
confidence: 99%
“…The author assumes that the attacker knows the plant model, but does not describe how the model is obtained. More recent works [8,13] demonstrate that Service Degradation (SD)-Controlled Data Injection attacks can be accurately built based on the NCS models previously learned through system identification attacks [8,13]. The harmful effects that SD-Controlled Data Injection attacks can produce on physical plants motivate the research on mechanisms able to prevent them, as well as to detect/identify them when they occur.…”
Section: Physicalmentioning
confidence: 99%
See 3 more Smart Citations