2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) 2020
DOI: 10.1109/iccps48487.2020.00011
|View full text |Cite
|
Sign up to set email alerts
|

Control Behavior Integrity for Distributed Cyber-Physical Systems

Abstract: Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave as intended. Cyberattacks, however, are not new and decades of security research have developed plenty of solutions to thwart them. Unfortunately, many of these solutions cannot be easily applied to safety-critical cyber-physical systems. Further, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…Its applicability and superiority have been demonstrated in a security web scenario with load balancing and a case study on an inter-domain routing application 1 . In future, we are planning to evaluate our framework in a realistic industrial control system with adaptive behaviors [20]- [23] by constructing the game in an automated way and supporting Architecture Description Interchange Language, such as acme [24].…”
Section: Discussionmentioning
confidence: 99%
“…Its applicability and superiority have been demonstrated in a security web scenario with load balancing and a case study on an inter-domain routing application 1 . In future, we are planning to evaluate our framework in a realistic industrial control system with adaptive behaviors [20]- [23] by constructing the game in an automated way and supporting Architecture Description Interchange Language, such as acme [24].…”
Section: Discussionmentioning
confidence: 99%
“…DAD is one such model-based approach. SCADMAN [7] provides a control code generation and verification mechanism to ensure the correctness of the behavior of individual PLCs. It was implemented and evaluated on the SWaT testbed.…”
Section: Design-based Approachmentioning
confidence: 99%
“…A security plan must be implemented to safeguard the intelligent grid [16]. The researchers in [17] proposed several monitoring procedures to keep an eye out for suspicious branch flow variations and anomalous load deviations to identify fake data injection (FDI) attacks. In this work [18], the authors proposed detecting FDI attacks using deep learning.…”
Section: Related Workmentioning
confidence: 99%