Model-Based CPS Attack Detection Techniques: Strengths and Limitations
暂无分享,去创建一个
Jianying Zhou | Chuadhry Mujeeb Ahmed | Surabhi Athalye | Chuadhry Mujeeb Ahmed | Jianying Zhou | S. Athalye | Chuadhry Mujeeb Ahmed
[1] Stavros Ntalampiras,et al. Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.
[2] Bruce M. McMillin,et al. Physical Attestation in the Smart Grid for Distributed State Verification , 2018, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).
[3] Jianying Zhou,et al. NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems , 2018, AsiaCCS.
[4] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[5] Jianying Zhou,et al. Challenges and Opportunities in CPS Security: A Physics-based Perspective , 2020, ArXiv.
[6] Carlos Murguia,et al. Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[7] Chuadhry Mujeeb Ahmed,et al. DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[8] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[9] Chuadhry Mujeeb Ahmed,et al. Revisiting Anomaly Detection in ICS: Aimed at Segregation of Attacks and Faults , 2020, ArXiv.
[10] Lakshminarayanan Samavedham,et al. A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems , 2018, Journal of Process Control.
[11] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[12] Ee-Chien Chang,et al. Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System , 2018, AsiaCCS.
[13] Douglas C. Montgomery,et al. Introduction to Statistical Quality Control , 1986 .
[14] Raheem A. Beyah,et al. Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.
[15] Carlos Murguia,et al. Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.
[16] Karl Johan Åström,et al. Computer-controlled systems (3rd ed.) , 1997 .
[17] Mani Srivastava,et al. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.
[18] Aditya P. Mathur,et al. WADI: a water distribution testbed for research in the design of secure cyber physical systems , 2017, CySWATER@CPSWeek.
[19] Dong Hoon Lee,et al. Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks , 2016, IEEE Transactions on Vehicular Technology.
[20] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[21] Sridhar Adepu,et al. Access Control in Water Distribution Networks: A Case Study , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS).
[22] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[23] Sridhar Adepu,et al. Limitations of state estimation based cyber attack detection schemes in industrial control systems , 2016, 2016 Smart City Security and Privacy Workshop (SCSP-W).
[24] G. Box,et al. Cumulative Sum Tests: Theory and Practice , 1968 .
[25] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[26] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[27] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[28] Aditya P. Mathur,et al. Hardware Identification via Sensor Fingerprinting in a Cyber Physical System , 2017, 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[29] Emilio Frazzoli,et al. Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems , 2017, ACM Trans. Cyber Phys. Syst..
[30] William H. Woodall,et al. The Use (and Misuse) of False Alarm Probabilities in Control Chart Design , 1992 .
[31] Paulo Tabuada,et al. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[32] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[33] Carlos Murguia,et al. Multistage Downstream Attack Detection in a Cyber Physical System , 2017, CyberICPS/SECPRE@ESORICS.
[34] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[35] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[36] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[37] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[38] Chuadhry Mujeeb Ahmed,et al. Process skew: fingerprinting the process for anomaly detection in industrial control systems , 2020, WISEC.
[39] Vijay Gupta,et al. On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.
[40] Jianying Zhou,et al. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS , 2018, ACSAC.
[41] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[42] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[43] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[44] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[45] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[46] Aditya Mathur,et al. NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints , 2017, ArXiv.
[47] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[48] Yun Gu,et al. A novel method to detect bad data injection attack in smart grid , 2013, INFOCOM Workshops.
[49] Chuadhry Mujeeb Ahmed,et al. Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).
[50] Jianying Zhou,et al. A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS , 2020, CRITIS.
[51] Michel Verhaegen,et al. Sensor fault detection and isolation for wind turbines based on subspace identification and Kalman filter techniques , 2009 .
[52] Dieter Gollmann,et al. Industrial control systems security: What is happening? , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[53] P. Welch. The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .
[54] Sridhar Adepu,et al. Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant , 2016, AsiaCCS.
[55] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[56] Jun Sun,et al. Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[57] Ronald Fisher,et al. A History of Cyber Incidents and Threats Involving Industrial Control Systems , 2018, Critical Infrastructure Protection.