2022
DOI: 10.1016/j.isatra.2022.03.018
|View full text |Cite
|
Sign up to set email alerts
|

Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-wide Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 87 publications
0
2
0
Order By: Relevance
“…As a result, fundamental cybersecurity practices such as implementing complex passwords or enforcing stringent authentication requirements were perceived as hindrances to system accessibility. Consequently, designers and operators of these systems deliberately avoided such measures [7]. Similarly, traditional anti-malware programs like signature-based antivirus tools were eschewed to mitigate the risk of false positives mistakenly quarantining or disabling crucial system operations.…”
Section: Background and Rationalementioning
confidence: 99%
“…As a result, fundamental cybersecurity practices such as implementing complex passwords or enforcing stringent authentication requirements were perceived as hindrances to system accessibility. Consequently, designers and operators of these systems deliberately avoided such measures [7]. Similarly, traditional anti-malware programs like signature-based antivirus tools were eschewed to mitigate the risk of false positives mistakenly quarantining or disabling crucial system operations.…”
Section: Background and Rationalementioning
confidence: 99%
“…In addition to the machine learning techniques, deep learning models, and advanced algorithms mentioned earlier, there are other tools and approaches that can be explored in the context of insider IDS in SCADA systems (Table IV  Data Fusion: To increase the precision of insider threat detection, data fusion merges data from many sources, including sensor data, network logs, and user behaviour. Complex patterns and correlations that might not be obvious when evaluating individual data sources might be found by integrating various data streams [20].…”
Section: B Deep Learning Modelsmentioning
confidence: 99%
“…The emphasis on industrial protocols and network segmentation in SCADA can help CPS, and SCADA can gain knowledge from CPS's cutting-edge encryption and authentication methods for securing data flow in integrated systems. Additionally, SCADA can benefit from CPS's distributed control architecture and adaptive communication protocols for increased resiliency and flexibility in a variety of industrial settings, while CPS can learn from SCADA's data filtering strategies and emphasis on redundancy for improved efficiency and continuous real-time control [20], [21].…”
Section: Comparison Of Ids Scada and Cyber Physical Systems (Table Iii)mentioning
confidence: 99%
“…Security threats may also focus on the availability of industrial systems, to make them unable to do their typical tasks through overloading [63]. Different types of physical and cyber-attacks can threaten the availability of an IIoT system, such as DoS attacks, DDoS attacks, Mirai botnet, BrickerBot, and Reaper.…”
Section: ) Industrial Iot (Iiot)mentioning
confidence: 99%