메뉴 건너뛰기




Volumn 8, Issue 4, 2014, Pages 1052-1062

Intrusion detection in cyber-physical systems: Techniques and challenges

Author keywords

Cyber physical system (CPS); intrusion detection; security.

Indexed keywords

CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; INDUSTRIAL RESEARCH; NETWORK SECURITY; PROCESS CONTROL;

EID: 84913586160     PISSN: 19328184     EISSN: 19379234     Source Type: Journal    
DOI: 10.1109/JSYST.2013.2257594     Document Type: Article
Times cited : (184)

References (51)
  • 3
    • 77956364473 scopus 로고    scopus 로고
    • A prototype architecture for cyberphysical systems
    • Jan
    • Y. Tan, S. Goddard, and L. C. Perez, "A prototype architecture for cyberphysical systems," ACM SIGBED Rev., vol. 5, no. 1, Jan. 2008, pp. 1-2.
    • (2008) ACM SIGBED Rev , vol.5 , Issue.1 , pp. 1-2
    • Tan, Y.1    Goddard, S.2    Perez, L.C.3
  • 5
    • 77953723898 scopus 로고    scopus 로고
    • Modeling of future cyber-physical energy systems for distributed sensing and control
    • Jul
    • M. D. Ilic L. Xie, U. A. Khan, and J. M. F. Moura, "Modeling of future cyber-physical energy systems for distributed sensing and control," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 4, pp. 825-838, Jul. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.40 , Issue.4 , pp. 825-838
    • Ilic L Xie, M.D.1    Khan, U.A.2    Moura, J.M.F.3
  • 10
    • 77953695984 scopus 로고    scopus 로고
    • Cybersecurity for critical infrastructures: Attack and defense modeling
    • Jul
    • C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for critical infrastructures: Attack and defense modeling," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 4, pp. 853-865, Jul. 2010.
    • (2010) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.40 , Issue.4 , pp. 853-865
    • Ten, C.-W.1    Manimaran, G.2    Liu, C.-C.3
  • 11
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding scada systems with anomaly detection
    • Berlin, Germany: Springer
    • J. Bigham, D. Gamez, and N. Lu, "Safeguarding SCADA systems with anomaly detection," in Computer Network Security, vol. 2776, Berlin, Germany: Springer, 2003, pp. 171-182.
    • (2003) Computer Network Security , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 14
    • 71849108397 scopus 로고    scopus 로고
    • Multi-disciplinary challenges and directions in networked cyber-physical systems
    • Austin, TX, USA, Oct
    • M. S. Branicky, M. Cavusoglu, and V. Liberatore, "Multi-disciplinary challenges and directions in networked cyber-physical systems," in Proc. NSF Workshop Cyber-Phys. Syst., Austin, TX, USA, Oct. 2006.
    • (2006) Proc. NSF Workshop Cyber-Phys. Syst
    • Branicky, M.S.1    Cavusoglu, M.2    Liberatore, V.3
  • 19
    • 58449121064 scopus 로고    scopus 로고
    • Self-organizing networked systems for technical applications: A discussion on open issues
    • Berlin, Germany: Springer
    • W. Elmenreich and H. De Meer, "Self-organizing networked systems for technical applications: A discussion on open issues," in Self-Organizing Systems, vol. 5343. Berlin, Germany: Springer, 2008, pp. 1-9.
    • (2008) Self-Organizing Systems , vol.5343 , pp. 1-9
    • Elmenreich, W.1    De Meer, H.2
  • 21
    • 64149124758 scopus 로고    scopus 로고
    • A survey of recent results in networked control systems
    • Jan
    • J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, "A survey of recent results in networked control systems," Proc. IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 138-162
    • Hespanha, J.P.1    Naghshtabrizi, P.2    Xu, Y.3
  • 22
    • 64149120662 scopus 로고    scopus 로고
    • Foundations of control and estimation over lossy networks
    • Jan
    • L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, "Foundations of control and estimation over lossy networks," Proc. IEEE, vol. 95, no. 1, pp. 163-187, Jan. 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 163-187
    • Schenato, L.1    Sinopoli, B.2    Franceschetti, M.3    Poolla, K.4    Sastry, S.S.5
  • 26
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 31
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • Jul
    • V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surveys, vol. 41, no. 3, pp. 15-58, Jul. 2009.
    • (2009) ACM Comput. Surveys , vol.41 , Issue.3 , pp. 15-58
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 32
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • V. J. Hodge and J. Austin, "A survey of outlier detection methodologies," Artif. Intell. Rev., vol. 22, no. 2, pp. 85-126, 2004.
    • (2004) Artif. Intell. Rev , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.J.1    Austin, J.2
  • 33
    • 14344259796 scopus 로고    scopus 로고
    • Distributed deviation detection in sensor networks
    • Dec
    • S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, "Distributed deviation detection in sensor networks," SIGMOD Rec., vol. 32, no. 4, pp. 77-82, Dec. 2003.
    • (2003) SIGMOD Rec , vol.32 , Issue.4 , pp. 77-82
    • Rajasegarar, S.1    Leckie, C.2    Palaniswami, M.3    Bezdek, J.C.4
  • 35
    • 38549109147 scopus 로고    scopus 로고
    • Quarter sphere based distributed anomaly detection in wireless sensor networks
    • Oct
    • S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, "Quarter sphere based distributed anomaly detection in wireless sensor networks," in Proc. IEEE Int. Conf. Commun., Oct. 2006, pp. 3864-3869.
    • (2006) Proc. IEEE Int. Conf. Commun , pp. 3864-3869
    • Rajasegarar, S.1    Leckie, C.2    Palaniswami, M.3    Bezdek, J.C.4
  • 37
    • 34548324813 scopus 로고    scopus 로고
    • Multivariate online anomaly detection using kernel recursive least squares
    • May
    • T. Ahmed, M. Coates, and A. Lakhina, "Multivariate online anomaly detection using kernel recursive least squares," in Proc. 26th IEEE Int. Conf. Comput. Commun., May 2007, pp. 625-633.
    • (2007) Proc. 26th IEEE Int. Conf. Comput. Commun , pp. 625-633
    • Ahmed, T.1    Coates, M.2    Lakhina, A.3
  • 40
    • 38149140244 scopus 로고    scopus 로고
    • A rough set based anomaly detection scheme considering the age of user profiles
    • Berlin, Germany: Springer
    • I.-H. Bae, "A rough set based anomaly detection scheme considering the age of user profiles," in Computation Science, vol. 4490, Berlin, Germany: Springer, 2007, pp. 558-561.
    • (2007) Computation Science , vol.4490 , pp. 558-561
    • Bae, I.-H.1
  • 45
    • 48149090928 scopus 로고    scopus 로고
    • Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
    • Nov
    • D. Dallas, C. Leckie, and K. Ramamohanarao, "Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks," in Proc. 15th IEEE Int. Conf. Netw., Nov. 2007, pp. 176-181.
    • (2007) Proc. 15th IEEE Int. Conf. Netw , pp. 176-181
    • Dallas, D.1    Leckie, C.2    Ramamohanarao, K.3
  • 49
    • 48249143566 scopus 로고    scopus 로고
    • A product machine model for anomaly detection of interposition attacks on cyber-physical systems
    • C. Bellettini and J. L. Rrushi, "A product machine model for anomaly detection of interposition attacks on cyber-physical systems," in Proc. 23rd Int. Inform. Security Conf., vol. 278. 2008, pp. 285-300.
    • (2008) Proc. 23rd Int. Inform. Security Conf , vol.278 , pp. 285-300
    • Bellettini, C.1    Rrushi, J.L.2
  • 51
    • 79956116601 scopus 로고    scopus 로고
    • Anomaly detection in wireless sensor networks: A survey
    • M. Xie, S. Han, and B. Tian, "Anomaly detection in wireless sensor networks: A survey," J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1302-1325, 2011.
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.4 , pp. 1302-1325
    • Xie, M.1    Han, S.2    Tian, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.