2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA) 2013
DOI: 10.1109/cpsna.2013.6614240
|View full text |Cite
|
Sign up to set email alerts
|

Defending malicious attacks in Cyber Physical Systems

Abstract: An increasing number of security incidents on industrial control systems drew a lot of concerns lately. Many attacks involved multiple attack vectors similar to internet attacks. However, CPS are more vulnerable to attacks. To evade detection, a hacker may apply multiple attack stages to gain the access to a control system. For example, he first employs a group of zombies (compromised machines) to identify the vulnerabilities of the target system and the findings would send back to the hacker through a communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Different kinds of anomaly-based IDS models have been suggested for SCADA systems [36], [2], [9], [37], [17], [15], [11]. Model-based anomaly detection for the Modbus/TCP industrial network protocol was first studied by Cheung et al [10].…”
Section: B Related Work 1) Attacksmentioning
confidence: 99%
“…Different kinds of anomaly-based IDS models have been suggested for SCADA systems [36], [2], [9], [37], [17], [15], [11]. Model-based anomaly detection for the Modbus/TCP industrial network protocol was first studied by Cheung et al [10].…”
Section: B Related Work 1) Attacksmentioning
confidence: 99%
“…Several recent studies (such as (Atassi, Elhajj, Chehab, & Kayssi, 2014) & (Chen, Hsiao, Yang, & Ou, 2013)) suggest anomaly-based detection for SCADA systems that is based on Markov chains. However, (Ye, Zhang, & Borror, 2004) showed that although the detection accuracy of this technique is high, the number of 'false positive' values is also high, as it is sensitive to noise.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly-based intrusion detection approaches are based on "the belief that an intruder's behavior will be noticeably different from that of a legitimate user" [34]. The main types of anomaly detection approaches that are applied to SCADA systems [3,4,11] are: Network-aware detection in which the anomaly detection models only consider network and OS-level events; Protocol-aware detection in which modeling the normal traffic relies on deep-packet-inspection and considers the SCADA control protocol's meta-data (message sizes, timing, argument addresses, command sequence); and Process-aware approaches which are based on process invariants, mathematical relationships among physical properties of the process controlled by the PLCs.…”
Section: Industrial Control Systems (Ics)mentioning
confidence: 99%
“…Surveys of techniques related to learning and detection of anomalies in critical control systems can be found in [3,4,11]. While most of the current commercial network intrusion detection systems (NIDS) are signature-based, i.e., they recognize an attack when it matches a previously defined signature, anomaly-based NIDS "are based on the belief that an intruder's behavior will be noticeably different from that of a legitimate user" [34].…”
Section: Anomaly Detection In Icsmentioning
confidence: 99%