Proceedings of the 24th International Conference on Real-Time Networks and Systems 2016
DOI: 10.1145/2997465.2997478
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…In this thesis, we focus on security measures for control systems. We highlight the specific characteristics of such systems and use the knowledge from the physical model of the plant to detect and mitigate attacks against CPSs (Mahfouzi et al, 2016). We emphasize the complex timing behaviors of CPSs that result from using shared resources.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this thesis, we focus on security measures for control systems. We highlight the specific characteristics of such systems and use the knowledge from the physical model of the plant to detect and mitigate attacks against CPSs (Mahfouzi et al, 2016). We emphasize the complex timing behaviors of CPSs that result from using shared resources.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…Another sort of mitigation mechanism that is inspired by the fault-tolerant control approaches is to reconfigure the controller and devise a reactive strategy to compensate for the damage from the attack. This can be done, for example, by changing to a reactive control signal (Barreto et al, 2013), transmitting signals with a higher power when a jamming attack is detected (Liu et al, 2014), or by increasing the sampling frequency of the system (Farraj et al, 2014;Mahfouzi et al, 2016). In these cases, attack mitigation is protecting CPSs from faults that are caused intentionally by adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we assume that there exists a host-based intrusion detection and resource management (IDRM) task [25] on each processing node, similar to [22]. This task monitors the workload variations and application requirements and decides on the amount of resources which should be allocated to achieve confidentiality for each message.…”
Section: Intrusion Detection and Resource Management Taskmentioning
confidence: 99%
“…This task monitors the workload variations and application requirements and decides on the amount of resources which should be allocated to achieve confidentiality for each message. This variation could be due to a change in the active task set in multi-mode systems [17], [18], a change in resource requirements of applications [19]- [21], or a change in security requirements of applications due to intrusion [22].…”
Section: Intrusion Detection and Resource Management Taskmentioning
confidence: 99%
See 1 more Smart Citation