An Investigation into the Response of a Water Treatment System to Cyber Attacks

作者: Sridhar Adepu , Aditya Mathur

DOI: 10.1109/HASE.2016.14

关键词:

摘要: … and PLCs, PLCs and actuators, among the PLCs, and the PLCs themselves. … system as well as the quality of the incoming water. The chemical dosing station is controlled by the PLC …

参考文章(13)
M. Almgren, E. Jonsson, Using active learning in intrusion detection ieee computer security foundations symposium. pp. 88- 98 ,(2004) , 10.1109/CSFW.2004.25
Cheolhyeon Kwon, Weiyi Liu, Inseok Hwang, Security analysis for Cyber-Physical Systems against stealthy deception attacks american control conference. pp. 3344- 3349 ,(2013) , 10.1109/ACC.2013.6580348
Sean Weerakkody, Yilin Mo, Bruno Sinopoli, Detecting integrity attacks on control systems using robust physical watermarking conference on decision and control. pp. 3757- 3764 ,(2014) , 10.1109/CDC.2014.7039974
Sharon Weinberger, Computer security: Is this the start of cyberwarfare? Nature. ,vol. 474, pp. 142- 145 ,(2011) , 10.1038/474142A
Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry, Attacks against process control systems Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. pp. 355- 366 ,(2011) , 10.1145/1966913.1966959
Thien-Toan Tran, Oh-Soon Shin, Jong-Ho Lee, Detection of replay attacks in smart grid systems international conference on computing management and telecommunications. pp. 298- 302 ,(2013) , 10.1109/COMMANTEL.2013.6482409
Wei Gao, Thomas Morris, Bradley Reaves, Drew Richey, On SCADA control system command and response injection and intrusion detection 2010 eCrime Researchers Summit. pp. 1- 9 ,(2010) , 10.1109/ECRIME.2010.5706699
Yilin Mo, J. Hespanha, B. Sinopoli, Robust detection in the presence of integrity attacks advances in computing and communications. pp. 3541- 3546 ,(2012) , 10.1109/ACC.2012.6315612
Zubair Ahmed Baig, Saif Ahmad, Sadiq Mohammed Sait, Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. pp. 1594- 1599 ,(2013) , 10.1109/TRUSTCOM.2013.196