13th International Conference on Security of Information and Networks 2020
DOI: 10.1145/3433174.3433615
|View full text |Cite
|
Sign up to set email alerts
|

Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and Resilience

Abstract: The operational cyber-physical system (CPS) state, safety and resource availability is impacted by the safety and security measures in place. This paper focused on i) command injection (CI) attack that alters the system behaviour through injection of false control and configuration commands into a control system and ii) response injection (RI) attacks that modifies the response from server to client, thereby providing false information about system state. In this project, we implemented deep learning (DL) mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Natural language processing and speech recognition frequently employ RNNs [74]. [75] uses deep ensemble RNNs-CNN to identify response injection and command injection threats in SCADA systems. A DL-based hybrid technique was presented by the authors in [76] to identify command injection attacks that cause remote tripping on relay systems inside a smart grid.…”
Section: A Artificial Intelligence-based Techniquesmentioning
confidence: 99%
“…Natural language processing and speech recognition frequently employ RNNs [74]. [75] uses deep ensemble RNNs-CNN to identify response injection and command injection threats in SCADA systems. A DL-based hybrid technique was presented by the authors in [76] to identify command injection attacks that cause remote tripping on relay systems inside a smart grid.…”
Section: A Artificial Intelligence-based Techniquesmentioning
confidence: 99%
“…The architectural design of the proposed model for APT intrusion detection system (IDS) is built to run through three stages. This involves implementing a multi-step security detection approach based on DL, that takes into consideration the distributed and multi-level nature of the ICS architecture and reflect on the APT lifecycle for the four main SCADA cyber-attacks as suggested in [35]. Thus, APT detection system…”
Section: B Apt Dasac Architectural Designmentioning
confidence: 99%
“…This data contains network transaction captured over serial line that contains network information, payload information and label. In [35], the focus was on command injection (CI) attack (alters the system behaviour through injection of false control and configuration commands into a control system) and response injection (RI) attacks (attack that modifies the response from server to client, thereby providing false information about system state). A multi-stage approach based on DL techniques was implemented, where this approach is validated with two case scenarios; a network transactions between a RTU & MTU in-house SCADA gas pipeline control system and a case study of CI and RI attacks detection.…”
Section: Application Domainsmentioning
confidence: 99%