2020
DOI: 10.1109/jsyst.2020.2991258
|View full text |Cite
|
Sign up to set email alerts
|

Brief Survey on Attack Detection Methods for Cyber-Physical Systems

Abstract: In recent years, Cyber-Physical Systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication networks makes CPSs vulnerable to intentional cyber-attacks. Therefore, a great number of attack detection methods have been proposed to enforce security of CPSs. In this paper, various false data injection attack detection methods presented for CPSs are investigated and reviewed. According to the knowledge of control information, the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
64
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 137 publications
(65 citation statements)
references
References 123 publications
0
64
0
1
Order By: Relevance
“…� Miscellaneous detection: The attack detection method namely, binary-based, singular value decomposition and Kalman filtering is explored in briefly with centralised and distributed controller [160,161]. � Issues with detection: The window selection in tempospatial plays the critical role in identification of bad data.…”
Section: Fdi Attack Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…� Miscellaneous detection: The attack detection method namely, binary-based, singular value decomposition and Kalman filtering is explored in briefly with centralised and distributed controller [160,161]. � Issues with detection: The window selection in tempospatial plays the critical role in identification of bad data.…”
Section: Fdi Attack Detectionmentioning
confidence: 99%
“…The false positive in tempo-spatial detection can be overcome by machine learning algorithm. The realtime FDI detection needs to be robust and address the missing data in detection method [157,158,161]. The practical detection method performance varies with type of attack and the attack may pass undetected.…”
Section: Fdi Attack Detectionmentioning
confidence: 99%
“…If a hacker manipulates the inverter setpoints, the inverter can first examine the new setpoints using the reference model, and then, may refuse to engage them if the projected output falls outside of the safe operating region of the inverter. Based on various types of cyberattacks [49], [50], different and more sophisticated methods can be developed.…”
Section: Communication and Self-security Featurementioning
confidence: 99%
“…A brief survey on attack detection for cyber-physical systems has been conducted in [13], including central controller and distributive controller scenarios in general cyber-physical systems. Regarding distributive power system, a model-based physical attack detection strategy for generation control has been proposed in [14], and intrusion detection in distributed frequency control for microgrid was investigated in [15].…”
Section: Introductionmentioning
confidence: 99%