메뉴 건너뛰기




Volumn , Issue , 2016, Pages

A brief survey of security approaches for cyber-physical systems

Author keywords

Control theoretic; Cyber security; Cyber physical systems; Survey

Indexed keywords

EMBEDDED SYSTEMS; SURVEYING; SURVEYS;

EID: 85011264054     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2016.7792424     Document Type: Conference Paper
Times cited : (29)

References (45)
  • 3
    • 84861198383 scopus 로고    scopus 로고
    • Cyber-physical systems: A perspective at the centennial
    • Kyoung-Dae Kim and Panganamala R Kumar. Cyber-physical systems: A perspective at the centennial. Proceedings of the IEEE, 100(Special Centennial Issue):1287-1308, 2012.
    • (2012) Proceedings of the IEEE , vol.100 , pp. 1287-1308
    • Kim, K.-D.1    Kumar, P.R.2
  • 6
    • 84901474949 scopus 로고    scopus 로고
    • Secure estimation and control for cyber-physical systems under adversarial attacks
    • Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. Secure estimation and control for cyber-physical systems under adversarial attacks. Automatic Control, IEEE Transactions on, 59(6):1454-1467, 2014.
    • (2014) Automatic Control, IEEE Transactions on , vol.59 , Issue.6 , pp. 1454-1467
    • Fawzi, H.1    Tabuada, P.2    Diggavi, S.3
  • 10
    • 84887278643 scopus 로고    scopus 로고
    • Attack detection and identification in cyber-physical systems
    • Fabio Pasqualetti, Florian Dorfler, and Francesco Bullo. Attack detection and identification in cyber-physical systems. Automatic Control, IEEE Transactions on, 58(11):2715-2729, 2013.
    • (2013) Automatic Control, IEEE Transactions on , vol.58 , Issue.11 , pp. 2715-2729
    • Pasqualetti, F.1    Dorfler, F.2    Bullo, F.3
  • 13
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • Shreyas Sundaram and Christoforos N Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. Automatic Control, IEEE Transactions on, 56(7):1495-1508, 2011.
    • (2011) Automatic Control, IEEE Transactions on , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.N.2
  • 15
    • 84920703223 scopus 로고    scopus 로고
    • A secure control framework for resource-limited adversaries
    • A. Teixeira, I. Shames, H. Sandberg, and K.H. Johansson. A secure control framework for resource-limited adversaries. Automatica, 51:135-148, 2015.
    • (2015) Automatica , vol.51 , pp. 135-148
    • Teixeira, A.1    Shames, I.2    Sandberg, H.3    Johansson, K.H.4
  • 16
    • 84921456182 scopus 로고    scopus 로고
    • Physical au thentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs
    • Feb
    • Y. Mo, S. Weerakkody, and B. Sinopoli. Physical au thentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. Control Systems, IEEE, 35(1):93-109, Feb 2015.
    • (2015) Control Systems, IEEE , vol.35 , Issue.1 , pp. 93-109
    • Mo, Y.1    Weerakkody, S.2    Sinopoli, B.3
  • 26
    • 84958150271 scopus 로고    scopus 로고
    • Runtime-monitoring for industrial control systems
    • Helge Janicke, Andrew Nicholson, Stuart Webber, and Antonio Cau. Runtime-monitoring for industrial control systems. Electronics, 4(4):995-1017, 2015.
    • (2015) Electronics , vol.4 , Issue.4 , pp. 995-1017
    • Janicke, H.1    Nicholson, A.2    Webber, S.3    Cau, A.4
  • 27
    • 84921416016 scopus 로고    scopus 로고
    • Detecting industrial control malware using automated plc code analytics
    • Saman Zonouz, Julian Rrushi, and Steve McLaughlin. Detecting industrial control malware using automated plc code analytics. Security & Privacy, IEEE, 12(6):40-47, 2014.
    • (2014) Security & Privacy, IEEE , vol.12 , Issue.6 , pp. 40-47
    • Zonouz, S.1    Rrushi, J.2    McLaughlin, S.3
  • 29
    • 84954527190 scopus 로고    scopus 로고
    • Through the eye of the plc: Semantic security monitoring for industrial processes
    • ACM
    • Dina Hadžiosmanović et al. Through the eye of the plc: semantic security monitoring for industrial processes. In Proceedings of the 30th ACSAC, pages 126-135. ACM, 2014.
    • (2014) Proceedings of the 30th ACSAC , pp. 126-135
    • Hadžiosmanović, D.1
  • 30
    • 84951871136 scopus 로고    scopus 로고
    • Modeling message sequences for intrusion detection in industrial control systems
    • Springer
    • Marco Caselli, Emmanuele Zambon, Jonathan Petit, and Frank Kargl. Modeling message sequences for intrusion detection in industrial control systems. In Critical Infrastructure Protection IX, pages 49-71. Springer, 2015.
    • (2015) Critical Infrastructure Protection IX , pp. 49-71
    • Caselli, M.1    Zambon, E.2    Petit, J.3    Kargl, F.4
  • 31
    • 84869391514 scopus 로고    scopus 로고
    • On dynamic malware payloads aimed at programmable logic controllers
    • Stephen E McLaughlin. On dynamic malware payloads aimed at programmable logic controllers. In HotSec, 2011.
    • (2011) HotSec
    • McLaughlin, S.E.1
  • 33
    • 85011255167 scopus 로고    scopus 로고
    • Cyber-critical infrastructure protection using real-time payload-based anomaly detection
    • Springer
    • Düssel et al. Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In Critical Information Infrastructures Security, pages 85-97. Springer, 2009.
    • (2009) Critical Information Infrastructures Security , pp. 85-97
    • Düssel1
  • 34
    • 84906094761 scopus 로고    scopus 로고
    • An unsupervised anomalybased detection approach for integrity attacks on scada systems
    • Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, and Ibrahim Khalil. An unsupervised anomalybased detection approach for integrity attacks on scada systems. Computers & Security, 46:94-110, 2014.
    • (2014) Computers & Security , vol.46 , pp. 94-110
    • Almalawi, A.1    Yu, X.2    Tari, Z.3    Fahad, A.4    Khalil, I.5
  • 35
    • 79952527986 scopus 로고    scopus 로고
    • On scada control system command and response injection and intrusion detection
    • IEEE, 2010
    • Wei Gao, Thomas Morris, Bradley Reaves, and Drew Richey. On scada control system command and response injection and intrusion detection. In eCrime Researchers Summit (eCrime), 2010, pages 1-9. IEEE, 2010.
    • (2010) ECrime Researchers Summit (ECrime) , pp. 1-9
    • Gao, W.1    Morris, T.2    Reaves, B.3    Richey, D.4
  • 36
    • 84876382615 scopus 로고    scopus 로고
    • Quickdraw SCADA IDS. http://www.digitalbond.com/tools/quickdraw/.
    • Quickdraw SCADA IDS
  • 37
    • 84881188775 scopus 로고    scopus 로고
    • Towards the protection of industrial control systems-conclusions of a vulnerability analysis of profinet io
    • Springer
    • Andreas Paul, Franka Schuster, and Hartmut König. Towards the protection of industrial control systems-conclusions of a vulnerability analysis of profinet io. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 160-176. Springer, 2013.
    • (2013) Detection of Intrusions and Malware, and Vulnerability Assessment , pp. 160-176
    • Paul, A.1    Schuster, F.2    König, H.3
  • 38
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Martin Roesch et al. Snort: Lightweight intrusion detection for networks. In LISA, volume 99, pages 229-238, 1999.
    • (1999) LISA , vol.99 , pp. 229-238
    • Roesch, M.1
  • 40
    • 84879190317 scopus 로고    scopus 로고
    • On survivability of mobile cyber physical systems with intrusion detection
    • Robert Mitchell and Ray Chen. On survivability of mobile cyber physical systems with intrusion detection. Wireless personal communications, 68(4):1377-1391, 2013.
    • (2013) Wireless Personal Communications , vol.68 , Issue.4 , pp. 1377-1391
    • Mitchell, R.1    Chen, R.2
  • 42
    • 78149468870 scopus 로고    scopus 로고
    • An experimental study of hierarchical intrusion detection for wireless industrial sensor networks
    • Sooyeon Shin, Taekyoung Kwon, Gil-Yong Jo, Youngman Park, and Haekyu Rhy. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. Industrial Informatics, IEEE Transactions on, 6(4):744-757, 2010.
    • (2010) Industrial Informatics, IEEE Transactions on , vol.6 , Issue.4 , pp. 744-757
    • Shin, S.1    Kwon, T.2    Jo, G.-Y.3    Park, Y.4    Rhy, H.5
  • 44
    • 50649107305 scopus 로고    scopus 로고
    • Idaho national laboratory supervisory control and data acquisition intrusion detection system (scada ids)
    • IEEE
    • Jared Verba and Michael Milvich. Idaho national laboratory supervisory control and data acquisition intrusion detection system (scada ids). In Technologies for Homeland Security, 2008 IEEE Conference on, pages 469-473. IEEE, 2008.
    • (2008) Technologies for Homeland Security, 2008 IEEE Conference on , pp. 469-473
    • Verba, J.1    Milvich, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.