2019
DOI: 10.48550/arxiv.1906.02279
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Investigation of Cyber Attacks on a Water Distribution System

Abstract: A Cyber Physical System (CPS) consists of cyber components for computation and communication, and physical components such as sensors and actuators for process control. These components are networked and interact in a feedback loop. CPS are found in critical infrastructure such as water distribution, power grid, and mass transportation. Often these systems are vulnerable to attacks as the cyber components such as Supervisory Control and Data Acquisition workstations, Human Machine Interface and Programmable Lo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…There are many existing studies about outlier detection in water treatment networks [2], [4], [5], [35], [36]. For instance, Adepu et al studied the impact of cyber attacks on water distribution systems [37]. Goh et al designed an unsupervised learning approach that regards Recurrent Neural Networks as a temporal predictor to detect attacks [1].…”
Section: H Case Study: Visualization For Spatio-temporal Embeddingmentioning
confidence: 99%
“…There are many existing studies about outlier detection in water treatment networks [2], [4], [5], [35], [36]. For instance, Adepu et al studied the impact of cyber attacks on water distribution systems [37]. Goh et al designed an unsupervised learning approach that regards Recurrent Neural Networks as a temporal predictor to detect attacks [1].…”
Section: H Case Study: Visualization For Spatio-temporal Embeddingmentioning
confidence: 99%
“…The individual risk to each security goal is calculated from the probability and impact values, as described in Section 4.5, and shown in Table 7. 6. The capable but unattractive risks are considered to be low since there is always the possibility that an attacker might inadvertently execute even unattractive threats.…”
Section: Risk Calculationmentioning
confidence: 99%
“…The risks, previously shown in Table 7. 6, implicitly indicate the need for proper mitigation at an abstract level, such as the integrity of ESP−RB must be protected due to a high risk. To refine these abstract requirements in an actionable way, security controls from a catalog are recommended and presented in Table 7.…”
Section: Intrinsic Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation