2013
DOI: 10.1109/tcst.2012.2211874
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models

Abstract: This paper investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. The design of the observers is achieved by using a delay-dependent linear matrix inequality method. The performance of our model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
61
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 141 publications
(65 citation statements)
references
References 24 publications
0
61
0
1
Order By: Relevance
“…While the conversation about the cybersecurity of water resources systems has been going on for long (Water Sector Coordinating Council 2008;Cardenas et al 2009), its reception and recognition by the water research community is relatively new. Two pioneering studies by Amin et al (2013a;2013b) performed simulation-based assessment and detection of stealthy deception attacks launched against cascaded canal systems. Perelman et al (2014) formulated the network vulnerability as an attacker-defender problem to identify the most critical links in a network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While the conversation about the cybersecurity of water resources systems has been going on for long (Water Sector Coordinating Council 2008;Cardenas et al 2009), its reception and recognition by the water research community is relatively new. Two pioneering studies by Amin et al (2013a;2013b) performed simulation-based assessment and detection of stealthy deception attacks launched against cascaded canal systems. Perelman et al (2014) formulated the network vulnerability as an attacker-defender problem to identify the most critical links in a network.…”
Section: Introductionmentioning
confidence: 99%
“…Manual detection of anomalies is extremely laborious and difficult, if not impossible, given the extreme intricacy of the modern distributed systems (Chandola et al 2009). Simulation-based and conventional machinelearning approaches also have limited versatility due to their inherent dependency on substantial domain knowledge (Amin et al 2013a;2013b) and inability to process data in their raw form (LeCun et al 2015). In this article, we design a variational autoencoder (VAE) (Kingma and Welling 2014), which is a deep generative model with variational inference, for detection of cyberattacks.…”
Section: Introductionmentioning
confidence: 99%
“…In [35], this methodology is applied for the estimation of the state-of-charge of batteries. Observer designs for time-delay systems with unknown inputs are presented in [2], [5], [23]. Swapping identifiers, originally developed for parameter estimation of ODE systems [21], [24], are constructed for parabolic PDEs in [43], [45], [46], [47].…”
Section: Literaturementioning
confidence: 99%
“…The first one is devoted to foundational issues, where the problems of resilient monitoring and control are motivated and formulated, [2][3][4][5][6]. The second group includes publications on control-theoretic methods for attack identification and alleviation, [7][8][9][10][11]. In these publications, the authors consider LTI systems with a given state space realization (A, B, C, D) and disturbances interpreted as attack vectors.…”
Section: Related Literaturementioning
confidence: 99%