Model-based Attack Detection Scheme for Smart Water Distribution Networks

作者: Chuadhry Mujeeb Ahmed , Carlos Murguia , Justin Ruths

DOI: 10.1145/3052973.3053011

关键词:

摘要: … attack detection schemes. Finally, we derive upper bounds on the estimator-state deviation that zeroalarm attacks … We obtain a dynamical model of the system from sensor data and use …

参考文章(23)
B. M. Adams, W. H. Woodall, C. A. Lowry, The Use (and Misuse) of False Alarm Probabilities in Control Chart Design Physica, Heidelberg. pp. 155- 168 ,(1992) , 10.1007/978-3-662-11789-7_11
Van Dobben de Bruyn, Cumulative sum test : theory and practice Griffin. ,(1968)
Jill Slay, Michael Miller, Lessons Learned from the Maroochy Water Breach international conference on critical infrastructure protection. pp. 73- 82 ,(2007) , 10.1007/978-0-387-75462-8_6
Lina Perelman, Saurabh Amin, A network interdiction model for analyzing the vulnerability of water distribution systems international conference on high confidence networked systems. pp. 135- 144 ,(2014) , 10.1145/2566468.2566480
Th. Cutsem, M. Ribbens-Pavella, L. Mili, Bad Data Identification Methods In Power System State Estimation-A Comparative Study IEEE Power & Energy Magazine. ,vol. 103, pp. 3037- 3049 ,(1985) , 10.1109/TPAS.1985.318945
Fei Miao, Quanyan Zhu, Miroslav Pajic, George J. Pappas, Coding sensor outputs for injection attacks detection 53rd IEEE Conference on Decision and Control. pp. 5776- 5781 ,(2014) , 10.1109/CDC.2014.7040293
Cheolhyeon Kwon, Weiyi Liu, Inseok Hwang, Security analysis for Cyber-Physical Systems against stealthy deception attacks american control conference. pp. 3344- 3349 ,(2013) , 10.1109/ACC.2013.6580348
Saurabh Amin, Xavier Litrico, Shankar Sastry, Alexandre M. Bayen, Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks IEEE Transactions on Control Systems and Technology. ,vol. 21, pp. 1963- 1970 ,(2013) , 10.1109/TCST.2012.2211873