2020
DOI: 10.1109/tcyb.2019.2912622
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Stealthy Deception Attack Against Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 107 publications
(30 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…It is even infeasible to attain sufficient physical protection of real assets in smart grids. Thus, it is necessary to develop detection along with inhibition solutions [142].…”
Section: E Smart Grid Physical Vulnerabilitiesmentioning
confidence: 99%
“…It is even infeasible to attain sufficient physical protection of real assets in smart grids. Thus, it is necessary to develop detection along with inhibition solutions [142].…”
Section: E Smart Grid Physical Vulnerabilitiesmentioning
confidence: 99%
“…The model is fitted using documented data to simulate considerable volumes for detection. According to Zhang et al [5] the application of the Kullback-Leibler divergence allows detecting stealth attacks, 1 https://www.google.com/url?sa=i&url=http%3A%2F%2Fwww.d efesacibernetica.ime.eb.br%2Fpub%2Frepositorio%2F2012-although, in its genesis, there is the assumption that the traffic targeted for inspection is Gauss distributed. In the prediction model in [6], the DLbased approach merges autoencoder with SVM to register intrusions.…”
Section: Related Workmentioning
confidence: 99%
“…An IDS's primary function is to detect possible threats and communicate them to an administrator by monitoring traffic. More recently, the intrusion prevention system (IPS) has been developed to represent a network security/prevention technology that scans network traffic flows to detect and prevent vulnerability exploits 5 . Generally speaking, the IPS sits behind the firewall, providing a complementary analysis layer.…”
Section: Approachmentioning
confidence: 99%
“…25 DoS attacks attempt to block sensor/control data from accessing the communication channel and preventing them reaching their destinations. Deception attacks destroy the NCSs by tampering the control signals and sensor measurements during transmission, 26,27 which is more concealed. Nowadays, security issues of NCSs have become one of the major concerns and received more and more attention.…”
Section: Introductionmentioning
confidence: 99%