Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time

This article proposes an approach to presenting the network infrastructure of cyberphysical systems to provide a more rapid identification of a suitable variant to rearranging the route on a graph that characterizes the target function. The proposed approach minimizes the number of used devices and allows neutralizing earlier detected cyberattacks against the system.

[1]  Wouter Joosen,et al.  A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks , 2009, 2009 First International Conference on Networks & Communications.

[2]  Soodabeh Soleymani,et al.  A New Distribution Network Reconfiguration Approach using a Tree Model , 2009 .

[3]  Dmitry P. Zegzhda,et al.  Sustainability of cyber-physical systems in the context of targeted destructive influences , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[4]  O. I. Sheluhin,et al.  Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode , 2018, Automatic Control and Computer Sciences.

[5]  Zhang Qi,et al.  A Framework of Cyber-Security Protection for Warship Systems , 2015, 2015 Sixth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA).

[6]  Biplab Sikdar,et al.  Anomaly detection in diurnal CPS monitoring data using a local density approach , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[7]  Piyush Maheshwari,et al.  Security Issues of Cyber Physical System: A Review , 2016 .

[8]  Anatoly Shalyto,et al.  Combining De Bruijn Graphs, Overlap Graphs and Microassembly for De Novo Genome Assembly , 2013 .

[9]  Peter D. Zegzhda,et al.  Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks , 2018, Autom. Control. Comput. Sci..

[10]  Haifeng HONG,et al.  Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation , 2017 .

[11]  Naixue Xiong,et al.  A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.