>
Fa   |   Ar   |   En
   protecting cyber physical systems against malicious intruders: a general detection and compensation strategy  
   
DOR 20.1001.2.0620044038.2020.17.1.15.7
نویسنده sayad haghighi mohammad ,abdollahi majid
منبع كنفرانس بين المللي انجمن رمز ايران - 2020 - دوره : 17 - کنفرانس بین الملی انجمن رمز ایران - کد همایش: 06200-44038 - صفحه:100 -104
چکیده    Cyber-physical systems (cps) are playing importantroles in our critical infrastructure now. a prominent family of cpss are networked control systems in which the control and feedback signals are carried over computer networks like the internet. communication over insecure networks makes system vulnerable to cyber attacks. in this paper, we present a general intrusion detection and compensation framework based on system/plant identification. this framework can be used to capture not only normal intrusions, but also the covert ones. a covert cps attack tries to manipulate the system output through the network interfaces in a way that the changes are imperceptible to human eyes. as realization instances of the proposed framework, a collection of previous research outputs on different plants ranging from dc motor to adaptive car cruise control (acc) will be discussed. additionally, we mention some simple compensation strategies and show how they can be useful in alleviating the attack effects.
کلیدواژه cyber physical systems ,networked control systems ,intrusion detection ,covert attacks
آدرس university of tehran, iran, sharif university of technology, iran
پست الکترونیکی majid.abdollahi@student.sharif.edu
 
   Protecting Cyber Physical Systems against Malicious Intruders: A General Detection and Compensation Strategy  
   
Authors Sayad Haghighi Mohammad ,Abdollahi Majid
Abstract    Cyber-Physical Systems (CPS) are playing importantroles in our critical infrastructure now. A prominent familyof CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communica
Keywords Cyber Physical Systems ,Networked Control Systems ,Intrusion Detection ,Covert Attacks
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved