Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering. (Embedded Systems Laboratory)
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering. École Polytechnique Fédérale de Lausanne (EPFL), Switzerland. (Embedded Systems Laboratory)ORCID iD: 0000-0002-1673-4733
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering. (Embedded Systems Laboratory)
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering. (Embedded Systems Laboratory)
Show others and affiliations
2016 (English)In: RTNS '16 Proceedings of the 24th International Conference on Real-Time Networks and Systems, New York: ACM Press, 2016, 141-150 p.Conference paper, Published paper (Refereed)
Abstract [en]

With cyber-physical systems opening to the outside world, security can no longer be considered a secondary issue. One of the key aspects in security of cyber-phyiscal systems is to deal with intrusions. In this paper, we highlight the several unique properties of control applications in cyber-physical systems. Using these unique properties, we propose a systematic intrusion-damage assessment and mitigation mechanism for the class of observable and controllable attacks.

On the one hand, in cyber-physical systems, the plants follow certain laws of physics and this can be utilized to address the intrusion-damage assessment problem. That is, the states of the controlled plant should follow those expected according to the physics of the system and any major discrepancy is potentially an indication of intrusion. Here, we use a machine learning algorithm to capture the normal behavior of the system according to its dynamics. On the other hand, the control performance strongly depends on the amount of allocated resources and this can be used to address the intrusion-damage mitigation problem. That is, the intrusion-damage mitigation is based on the idea of allocating more resources to the control application under attack. This is done using a feedback-based approach including a convex optimization.

Place, publisher, year, edition, pages
New York: ACM Press, 2016. 141-150 p.
Keyword [en]
Security of cyber-physical systems, intrusion detection, intrusion mitigation, control applications, resource management
National Category
Computer Science
Identifiers
URN: urn:nbn:se:liu:diva-132823DOI: 10.1145/2997465.2997478ISI: 000391255400014ISBN: 9781450347877 (print)OAI: oai:DiVA.org:liu-132823DiVA: diva2:1050793
Conference
24th International Conference on Real-Time Networks and Systems, Brest, France, October 19-21, 2016
Available from: 2016-11-30 Created: 2016-11-30 Last updated: 2017-02-06Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Mahfouzi, RouhollahAminifar, AmirEles, PetruPeng, ZeboVillani, Mattias
By organisation
Software and SystemsFaculty of Science & EngineeringStatisticsFaculty of Arts and Sciences
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 63 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf