2019
DOI: 10.1186/s13638-019-1389-1
|View full text |Cite
|
Sign up to set email alerts
|

Detecting stealthy attacks against industrial control systems based on residual skewness analysis

Abstract: With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides. More exposure to the outside IT world has made ICS an attractive target for hackers, so it becomes urgent to protect the security of ICS. Skilled attackers can penetrate control networks and then manipulate sensor readings or control signals persistently until the system crashes, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 44 publications
0
10
0
Order By: Relevance
“… failure detector to detect replay attack, while (Hu et al 2019). proposed a residual based detection approach by using skewness analysis of the residual signal.…”
Section: ˆ()mentioning
confidence: 99%
See 1 more Smart Citation
“… failure detector to detect replay attack, while (Hu et al 2019). proposed a residual based detection approach by using skewness analysis of the residual signal.…”
Section: ˆ()mentioning
confidence: 99%
“…Numerical experiments were carried out by using IEEE 9, 14, 30, 118, and 300-bus systems to verify the proposed defense framework. (Hu et al 2019) focused on detection of stealthy attacks on CPSs. They proposed a residual based detection approach by using skewness analysis of the residual signal.…”
Section: ˆ()mentioning
confidence: 99%
“…A majority of these works propose a method to CPSs attack detection using double closed-loop security control structure [12] or design an anomaly detection approach based on zone partition for the Industrial CPSs [13]. Hu et al [14], propose a detection technique against stealthy attacks that can keep themselves undetected by following the expected behaviour of the system closely. Some consider a coding method for the sensor outputs to detect stealthy false data injection attacks [15].…”
Section: Related Workmentioning
confidence: 99%
“…[15][16][17] An important part of the cyberattack resiliency of PCSs is the ability to detect the presence of a cyberattack, and many detection schemes have been proposed. [15][16][17][18][19][20][21][22][23][24][25][26] Attack detection schemes may be broadly classified as either passive or active. Passive detection schemes monitor a process using regular operational data.…”
Section: Introductionmentioning
confidence: 99%