Detection and mitigation of classes of attacks in supervisory control systems

The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable...

Full description

Saved in:
Bibliographic Details
Published inAutomatica (Oxford) Vol. 97; pp. 121 - 133
Main Authors Carvalho, Lilian Kawakami, Wu, Yi-Chin, Kwong, Raymond, Lafortune, Stéphane
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.11.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed “GF-safe controllability”, is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example.
AbstractList The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed “GF-safe controllability”, is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example.
Author Carvalho, Lilian Kawakami
Lafortune, Stéphane
Wu, Yi-Chin
Kwong, Raymond
Author_xml – sequence: 1
  givenname: Lilian Kawakami
  surname: Carvalho
  fullname: Carvalho, Lilian Kawakami
  email: lilian@dee.ufrj.br
  organization: Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Brazil
– sequence: 2
  givenname: Yi-Chin
  surname: Wu
  fullname: Wu, Yi-Chin
  email: yichin.wu@berkeley.edu
  organization: Department of EECS, University of Michigan, USA
– sequence: 3
  givenname: Raymond
  surname: Kwong
  fullname: Kwong, Raymond
  email: kwong@control.utoronto.ca
  organization: Department of ECE, University of Toronto, Canada
– sequence: 4
  givenname: Stéphane
  surname: Lafortune
  fullname: Lafortune, Stéphane
  email: stephane@umich.edu
  organization: Department of EECS, University of Michigan, USA
BookMark eNqNkN1KAzEQRoNUsFbfIS-w66TZ7qY3gtZfqHij12GanZXU7aZk0kLf3m0rCN7o1czAfAe-cy4GXehICKkgV6DKq2WOmxRWmLzDfAzK5FDloKoTMVSm0tnY6HIghgAwyRRMzZk4Z172Z6HMeChe7iiRSz50ErtarnzyH3g4QyNdi8zE-xVTQvfJ0neSN2uKW88h7qQLXYqhlbzjRCu-EKcNtkyX33Mk3h_u32ZP2fz18Xl2M8-cViZlFVKtDWnEZjEB0iVADTUiGjBoiob0tNALVUJV9k8ADrCholLFxCy07huNhDlyXQzMkRq7jn6FcWcV2L0Wu7Q_Wuxei4XK9lr66PWvqPPp0DhF9O1_ALdHAPUFt56iZeepc1T72Ju0dfB_Q74Afb-J2Q
CitedBy_id crossref_primary_10_1016_j_jfranklin_2022_09_014
crossref_primary_10_3390_s24123923
crossref_primary_10_1109_TAC_2021_3051459
crossref_primary_10_1016_j_automatica_2022_110736
crossref_primary_10_1016_j_ifacol_2023_10_1900
crossref_primary_10_1016_j_arcontrol_2021_03_007
crossref_primary_10_1109_TAC_2023_3323531
crossref_primary_10_1016_j_jpdc_2023_104780
crossref_primary_10_1109_TCYB_2022_3167483
crossref_primary_10_1109_TAC_2024_3367656
crossref_primary_10_1016_j_arcontrol_2023_100907
crossref_primary_10_1016_j_ifacol_2023_10_417
crossref_primary_10_1109_TAC_2023_3253462
crossref_primary_10_1109_LCSYS_2022_3163467
crossref_primary_10_1016_j_ifacol_2021_04_031
crossref_primary_10_1016_j_ifacol_2023_10_268
crossref_primary_10_1109_TAC_2022_3191393
crossref_primary_10_1016_j_automatica_2020_109172
crossref_primary_10_1016_j_ifacol_2024_07_004
crossref_primary_10_1109_TSMC_2022_3225870
crossref_primary_10_1016_j_ifacol_2024_07_006
crossref_primary_10_1080_00207179_2019_1690691
crossref_primary_10_1109_TAC_2021_3094737
crossref_primary_10_1109_TAC_2022_3218545
crossref_primary_10_1109_TCSII_2020_3028105
crossref_primary_10_1016_j_ifacol_2024_07_002
crossref_primary_10_1109_TCNS_2023_3312249
crossref_primary_10_1109_LCSYS_2022_3168926
crossref_primary_10_1109_TAC_2020_3004326
crossref_primary_10_1109_TAC_2023_3329341
crossref_primary_10_1016_j_nahs_2021_101111
crossref_primary_10_1016_j_ifacol_2021_04_001
crossref_primary_10_1016_j_nahs_2021_101073
crossref_primary_10_1109_ACCESS_2021_3135870
crossref_primary_10_1007_s10626_021_00348_y
crossref_primary_10_1016_j_ifacol_2020_12_2288
crossref_primary_10_1016_j_ifacol_2020_12_2321
crossref_primary_10_1016_j_automatica_2021_109605
crossref_primary_10_1016_j_ifacol_2021_04_003
crossref_primary_10_1109_TAC_2021_3063699
crossref_primary_10_1007_s10626_024_00408_z
crossref_primary_10_1016_j_jfranklin_2024_106887
crossref_primary_10_1016_j_ifacol_2021_04_010
crossref_primary_10_1016_j_ins_2021_03_033
crossref_primary_10_1109_JAS_2024_124680
crossref_primary_10_1016_j_ifacol_2023_10_1515
crossref_primary_10_1109_TASE_2020_3041207
crossref_primary_10_1016_j_nahs_2021_101087
crossref_primary_10_3390_math12172635
crossref_primary_10_1007_s10626_021_00356_y
crossref_primary_10_1007_s10626_020_00312_2
crossref_primary_10_1016_j_automatica_2023_111330
crossref_primary_10_1007_s11424_025_4263_8
crossref_primary_10_1109_TASE_2021_3076697
crossref_primary_10_1016_j_nahs_2021_101057
crossref_primary_10_1007_s10626_021_00351_3
crossref_primary_10_1109_JAS_2024_124596
crossref_primary_10_1109_TII_2020_2987629
crossref_primary_10_1007_s40313_018_0420_9
crossref_primary_10_1016_j_ifacol_2022_10_330
crossref_primary_10_1109_TAC_2021_3091438
crossref_primary_10_1016_j_ifacol_2024_07_031
crossref_primary_10_1016_j_ifacol_2024_07_033
crossref_primary_10_1016_j_ifacol_2024_07_032
crossref_primary_10_1016_j_ifacol_2024_07_034
crossref_primary_10_1016_j_ifacol_2021_04_069
crossref_primary_10_1109_ACCESS_2020_2977423
crossref_primary_10_1109_TCSII_2022_3195182
crossref_primary_10_1016_j_ifacol_2022_10_321
crossref_primary_10_1109_JAS_2022_105548
crossref_primary_10_1109_OJCSYS_2023_3290408
crossref_primary_10_1007_s10626_022_00369_1
crossref_primary_10_1016_j_nahs_2022_101162
crossref_primary_10_1038_s41598_022_19737_w
crossref_primary_10_1016_j_automatica_2021_109714
crossref_primary_10_1109_TSMC_2021_3051096
crossref_primary_10_1016_j_ifacol_2020_12_2791
crossref_primary_10_1016_j_ins_2022_05_102
crossref_primary_10_1016_j_automatica_2023_111076
crossref_primary_10_1109_JAS_2023_123702
crossref_primary_10_1155_2021_6646799
crossref_primary_10_1109_TASE_2024_3416821
crossref_primary_10_1109_TAC_2023_3339497
crossref_primary_10_1109_TIE_2023_3281698
crossref_primary_10_1016_j_ins_2022_11_100
crossref_primary_10_1109_TAC_2024_3492955
crossref_primary_10_3390_s24144445
crossref_primary_10_1371_journal_pone_0314104
crossref_primary_10_1016_j_jfranklin_2020_12_004
crossref_primary_10_3390_math11102313
crossref_primary_10_1016_j_ins_2024_120145
crossref_primary_10_1016_j_ifacol_2021_04_048
crossref_primary_10_1016_j_ifacol_2021_04_047
crossref_primary_10_1109_LCSYS_2022_3168735
crossref_primary_10_1007_s12555_023_0200_6
crossref_primary_10_1016_j_automatica_2024_112004
crossref_primary_10_3390_math11040943
crossref_primary_10_1155_2020_8887933
crossref_primary_10_3390_app11219790
crossref_primary_10_1007_s10626_024_00401_6
Cites_doi 10.1109/5.21072
10.1016/j.automatica.2011.01.007
10.1109/TAC.2002.802763
10.1109/DCDS.2011.5970312
10.1109/9.412626
10.1109/TSMC.2013.2291538
10.1109/TII.2009.2028135
10.1016/j.ifacol.2015.06.483
10.1145/1592451.1592452
10.1109/TAC.2011.2124950
10.1016/j.cose.2009.06.008
10.1109/TAC.2014.2358811
10.1109/WODES.2016.7497863
10.1016/j.automatica.2012.06.042
10.1109/9.940942
10.1109/JPROC.2011.2165689
10.3182/20140514-3-FR-4046.00092
10.1109/ICDCS.Workshops.2008.40
10.1016/j.jnca.2012.05.003
10.1109/CDC.2005.1582703
10.3182/20140514-3-FR-4046.00106
ContentType Journal Article
Copyright 2018 Elsevier Ltd
Copyright_xml – notice: 2018 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.automatica.2018.07.017
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1873-2836
EndPage 133
ExternalDocumentID 10_1016_j_automatica_2018_07_017
S0005109818303741
GrantInformation_xml – fundername: Natural Sciences and Engineering Research Council of Canada
  grantid: RGPIN-2015-04273
  funderid: http://dx.doi.org/10.13039/501100000038
– fundername: U.S. National Science Foundation
  grantid: CNS-1421122
  funderid: http://dx.doi.org/10.13039/100000001
– fundername: Brazil’s CNPq (National Council of Technological and Scientific Development)
  funderid: http://dx.doi.org/10.13039/501100003593
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
23N
3R3
4.4
457
4G.
5GY
5VS
6TJ
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
ABDEX
ABFNM
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADIYS
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHPGS
AI.
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
APLSM
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
K-O
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSB
SSD
SST
SSZ
T5K
T9H
TAE
TN5
VH1
WH7
WUQ
X6Y
XFK
XPP
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
ID FETCH-LOGICAL-c318t-7aed38e3aafb50e3600d0daaa808a84fe3943b16076e3a00c0afe471458b33283
IEDL.DBID .~1
ISSN 0005-1098
IngestDate Tue Jul 01 00:44:02 EDT 2025
Thu Apr 24 23:02:19 EDT 2025
Fri Feb 23 02:47:22 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Cyber-attacks
Discrete event systems
Failure diagnosis
Automata
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c318t-7aed38e3aafb50e3600d0daaa808a84fe3943b16076e3a00c0afe471458b33283
PageCount 13
ParticipantIDs crossref_primary_10_1016_j_automatica_2018_07_017
crossref_citationtrail_10_1016_j_automatica_2018_07_017
elsevier_sciencedirect_doi_10_1016_j_automatica_2018_07_017
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate November 2018
2018-11-00
PublicationDateYYYYMMDD 2018-11-01
PublicationDate_xml – month: 11
  year: 2018
  text: November 2018
PublicationDecade 2010
PublicationTitle Automatica (Oxford)
PublicationYear 2018
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Wonham, W. M. (2013). Supervisory control of discrete-event systems. Technical Report. University of Toronto.
Ramadge, Wonham (b17) 1989; 77
(pp. 294–299). Cachan, France.
Nooruldeen, Schmidt (b15) 2015; 60
Thorsley, Teneketzis (b22) 2006
Moreira, Jesus, Basilio (b13) 2011; 56
Sampath, Sengupta, Lafortune, Sinnamohideen, Teneketzis (b19) 1995; 40
(pp. 428–433).
Yoo, Lafortune (b25) 2002; 47
Faraut, Piétrac, Niel (b8) 2009; 5
Carvalho, Basilio, Moreira (b4) 2012; 48
Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2016). Detection and prevention of actuator enablement attacks in supervisory control systems. In
Banerjee, Venkatasubramanian, Mukherjee, Gupta (b2) 2012; 100
Paoli, Sartini, Lafortune (b16) 2011; 47
Cassandras, Lafortune (b7) 2008
Nke, Y., & Lunze, J. (2011). Online control reconfiguration for a faulty manufacturing process. In
Hoffman, Zage, Nita-Rotaru (b9) 2009; 42
(pp. 3493–3498).
Rohloff, K. (2005). Sensor failure tolerant supervisory control. In
Wen, Kumar, Huang (b23) 2014; 44
Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In
.
Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2018). Detection and mitigation of classes of attacks in supervisory control systems. ArXiv e-prints -
(pp. 495–500).
Modi, Patel, Borisaniya, Patel, Patel, Rajarajan (b11) 2013; 36
Moor, T. (2015). Fault-tolerant supervisory control. In
(pp. 19–24).
Shengbing, Zhongdong, Chandra, Kumar (b20) 2001; 46
Alves, M. V. S., Basilio, J. C., da Cunha, A. E. C., Carvalho, L. K., & Moreira, M. V. (2014). Robust supervisory control against intermittent loss of observations. In
(pp. 298–305). Xi’an, China.
Lazarevic, Kumar, Srivastava (b10) 2005
Sulek, A. N., & Schmidt, K. W. (2014). Computation of supervisors for fault-recovery and repair for discrete event systems. In
Zhou, Leckie, Karunasekera (b26) 2010; 29
Moreira (10.1016/j.automatica.2018.07.017_b13) 2011; 56
10.1016/j.automatica.2018.07.017_b18
10.1016/j.automatica.2018.07.017_b12
10.1016/j.automatica.2018.07.017_b14
Lazarevic (10.1016/j.automatica.2018.07.017_b10) 2005
Shengbing (10.1016/j.automatica.2018.07.017_b20) 2001; 46
Sampath (10.1016/j.automatica.2018.07.017_b19) 1995; 40
Hoffman (10.1016/j.automatica.2018.07.017_b9) 2009; 42
Zhou (10.1016/j.automatica.2018.07.017_b26) 2010; 29
Cassandras (10.1016/j.automatica.2018.07.017_b7) 2008
Thorsley (10.1016/j.automatica.2018.07.017_b22) 2006
Banerjee (10.1016/j.automatica.2018.07.017_b2) 2012; 100
10.1016/j.automatica.2018.07.017_b6
10.1016/j.automatica.2018.07.017_b24
10.1016/j.automatica.2018.07.017_b5
Ramadge (10.1016/j.automatica.2018.07.017_b17) 1989; 77
Wen (10.1016/j.automatica.2018.07.017_b23) 2014; 44
10.1016/j.automatica.2018.07.017_b3
10.1016/j.automatica.2018.07.017_b21
Paoli (10.1016/j.automatica.2018.07.017_b16) 2011; 47
Faraut (10.1016/j.automatica.2018.07.017_b8) 2009; 5
10.1016/j.automatica.2018.07.017_b1
Nooruldeen (10.1016/j.automatica.2018.07.017_b15) 2015; 60
Carvalho (10.1016/j.automatica.2018.07.017_b4) 2012; 48
Modi (10.1016/j.automatica.2018.07.017_b11) 2013; 36
Yoo (10.1016/j.automatica.2018.07.017_b25) 2002; 47
References_xml – volume: 44
  start-page: 1056
  year: 2014
  end-page: 1066
  ident: b23
  article-title: Framework for optimal fault-tolerant control synthesis: Maximize pre-fault while minimize post-fault behaviors
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
– volume: 56
  start-page: 1679
  year: 2011
  end-page: 1684
  ident: b13
  article-title: Polynomial time verification of decentralized diagnosability of discrete event systems
  publication-title: IEEE Transactions on Automatic Control
– volume: 5
  start-page: 443
  year: 2009
  end-page: 453
  ident: b8
  article-title: Formal approach to multimodal control design: Application to mode switching
  publication-title: IEEE Transactions on Industrial Informatics
– volume: 60
  start-page: 1630
  year: 2015
  end-page: 1634
  ident: b15
  article-title: State attraction under language specification for the reconfiguration of discrete event systems
  publication-title: IEEE Transactions on Automatic Control
– reference: Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2018). Detection and mitigation of classes of attacks in supervisory control systems. ArXiv e-prints -
– volume: 77
  start-page: 81
  year: 1989
  end-page: 98
  ident: b17
  article-title: The control of discrete-event systems
  publication-title: Proceedings of the IEEE
– volume: 48
  start-page: 2068
  year: 2012
  end-page: 2078
  ident: b4
  article-title: Robust diagnosis of discrete-event systems against intermittent loss of observations
  publication-title: Automatica
– start-page: 6047
  year: 2006
  end-page: 6054
  ident: b22
  article-title: Intrusion detection in controlled discrete event systems
  publication-title: Proc. 45th IEEE conference on decision and control
– reference: (pp. 294–299). Cachan, France.
– volume: 29
  start-page: 124
  year: 2010
  end-page: 140
  ident: b26
  article-title: A survey of coordinated attacks and collaborative intrusion detection
  publication-title: Computers & Security
– volume: 47
  start-page: 639
  year: 2011
  end-page: 649
  ident: b16
  article-title: Active fault tolerant control of discrete event systems using online diagnostics
  publication-title: Automatica
– start-page: 19
  year: 2005
  end-page: 78
  ident: b10
  article-title: Intrusion detection: A survey
  publication-title: Managing cyber threats
– volume: 100
  start-page: 283
  year: 2012
  end-page: 299
  ident: b2
  article-title: Ensuring safety, security, and sustainability of mission-critical cyber–physical systems
  publication-title: Proceedings of the IEEE
– reference: Moor, T. (2015). Fault-tolerant supervisory control. In
– year: 2008
  ident: b7
  article-title: Introduction to discrete event systems
– volume: 46
  start-page: 1318
  year: 2001
  end-page: 1321
  ident: b20
  article-title: A polynomial algorithm for testing diagnosability of discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 19–24).
– reference: Rohloff, K. (2005). Sensor failure tolerant supervisory control. In
– volume: 42
  start-page: 1
  year: 2009
  end-page: 31
  ident: b9
  article-title: A survey of attack and defense techniques for reputation systems
  publication-title: ACM Computing Surveys
– volume: 47
  start-page: 1491
  year: 2002
  end-page: 1495
  ident: b25
  article-title: Polynomial-time verification of diagnosability of partially observed discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
– volume: 36
  start-page: 42
  year: 2013
  end-page: 57
  ident: b11
  article-title: A survey of intrusion detection techniques in cloud
  publication-title: Journal of Network and Computer Applications
– reference: Sulek, A. N., & Schmidt, K. W. (2014). Computation of supervisors for fault-recovery and repair for discrete event systems. In
– reference: Wonham, W. M. (2013). Supervisory control of discrete-event systems. Technical Report. University of Toronto.
– reference: Alves, M. V. S., Basilio, J. C., da Cunha, A. E. C., Carvalho, L. K., & Moreira, M. V. (2014). Robust supervisory control against intermittent loss of observations. In
– reference: .
– reference: Nke, Y., & Lunze, J. (2011). Online control reconfiguration for a faulty manufacturing process. In
– volume: 40
  start-page: 1555
  year: 1995
  end-page: 1575
  ident: b19
  article-title: Diagnosability of discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 428–433).
– reference: Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In
– reference: (pp. 3493–3498).
– reference: (pp. 495–500).
– reference: Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2016). Detection and prevention of actuator enablement attacks in supervisory control systems. In
– reference: (pp. 298–305). Xi’an, China.
– volume: 77
  start-page: 81
  year: 1989
  ident: 10.1016/j.automatica.2018.07.017_b17
  article-title: The control of discrete-event systems
  publication-title: Proceedings of the IEEE
  doi: 10.1109/5.21072
– start-page: 6047
  year: 2006
  ident: 10.1016/j.automatica.2018.07.017_b22
  article-title: Intrusion detection in controlled discrete event systems
– volume: 47
  start-page: 639
  year: 2011
  ident: 10.1016/j.automatica.2018.07.017_b16
  article-title: Active fault tolerant control of discrete event systems using online diagnostics
  publication-title: Automatica
  doi: 10.1016/j.automatica.2011.01.007
– volume: 47
  start-page: 1491
  year: 2002
  ident: 10.1016/j.automatica.2018.07.017_b25
  article-title: Polynomial-time verification of diagnosability of partially observed discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2002.802763
– ident: 10.1016/j.automatica.2018.07.017_b14
  doi: 10.1109/DCDS.2011.5970312
– volume: 40
  start-page: 1555
  year: 1995
  ident: 10.1016/j.automatica.2018.07.017_b19
  article-title: Diagnosability of discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/9.412626
– volume: 44
  start-page: 1056
  year: 2014
  ident: 10.1016/j.automatica.2018.07.017_b23
  article-title: Framework for optimal fault-tolerant control synthesis: Maximize pre-fault while minimize post-fault behaviors
  publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems
  doi: 10.1109/TSMC.2013.2291538
– volume: 5
  start-page: 443
  year: 2009
  ident: 10.1016/j.automatica.2018.07.017_b8
  article-title: Formal approach to multimodal control design: Application to mode switching
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2009.2028135
– ident: 10.1016/j.automatica.2018.07.017_b12
  doi: 10.1016/j.ifacol.2015.06.483
– volume: 42
  start-page: 1
  year: 2009
  ident: 10.1016/j.automatica.2018.07.017_b9
  article-title: A survey of attack and defense techniques for reputation systems
  publication-title: ACM Computing Surveys
  doi: 10.1145/1592451.1592452
– start-page: 19
  year: 2005
  ident: 10.1016/j.automatica.2018.07.017_b10
  article-title: Intrusion detection: A survey
– ident: 10.1016/j.automatica.2018.07.017_b6
– volume: 56
  start-page: 1679
  year: 2011
  ident: 10.1016/j.automatica.2018.07.017_b13
  article-title: Polynomial time verification of decentralized diagnosability of discrete event systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2011.2124950
– ident: 10.1016/j.automatica.2018.07.017_b24
– volume: 29
  start-page: 124
  year: 2010
  ident: 10.1016/j.automatica.2018.07.017_b26
  article-title: A survey of coordinated attacks and collaborative intrusion detection
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2009.06.008
– year: 2008
  ident: 10.1016/j.automatica.2018.07.017_b7
– volume: 60
  start-page: 1630
  year: 2015
  ident: 10.1016/j.automatica.2018.07.017_b15
  article-title: State attraction under language specification for the reconfiguration of discrete event systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2014.2358811
– ident: 10.1016/j.automatica.2018.07.017_b5
  doi: 10.1109/WODES.2016.7497863
– volume: 48
  start-page: 2068
  year: 2012
  ident: 10.1016/j.automatica.2018.07.017_b4
  article-title: Robust diagnosis of discrete-event systems against intermittent loss of observations
  publication-title: Automatica
  doi: 10.1016/j.automatica.2012.06.042
– volume: 46
  start-page: 1318
  year: 2001
  ident: 10.1016/j.automatica.2018.07.017_b20
  article-title: A polynomial algorithm for testing diagnosability of discrete-event systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/9.940942
– volume: 100
  start-page: 283
  year: 2012
  ident: 10.1016/j.automatica.2018.07.017_b2
  article-title: Ensuring safety, security, and sustainability of mission-critical cyber–physical systems
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2011.2165689
– ident: 10.1016/j.automatica.2018.07.017_b1
  doi: 10.3182/20140514-3-FR-4046.00092
– ident: 10.1016/j.automatica.2018.07.017_b3
  doi: 10.1109/ICDCS.Workshops.2008.40
– volume: 36
  start-page: 42
  year: 2013
  ident: 10.1016/j.automatica.2018.07.017_b11
  article-title: A survey of intrusion detection techniques in cloud
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2012.05.003
– ident: 10.1016/j.automatica.2018.07.017_b18
  doi: 10.1109/CDC.2005.1582703
– ident: 10.1016/j.automatica.2018.07.017_b21
  doi: 10.3182/20140514-3-FR-4046.00106
SSID ssj0004182
Score 2.617956
Snippet The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 121
SubjectTerms Automata
Cyber-attacks
Discrete event systems
Failure diagnosis
Title Detection and mitigation of classes of attacks in supervisory control systems
URI https://dx.doi.org/10.1016/j.automatica.2018.07.017
Volume 97
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA5jXvQg_sT5Y-TgtS41aZPiaUzHVNzJwW4hbVOoaDvW7uDFv928pHUTBAVvTemD8vLy3gt83_cQuswCrRQBinKYxh4zlwrPVLlrL4v8iCeCx35m1T6n4WTGHubBvINGLRcGYJVN7nc53Wbr5s2g8eZgkefA8YWAikzFoSCiYhnsjEOUX32sYR7MF04x3CpuRqJB8ziMl1rVpVVGBQUiX1gZTzu67IcStVF2xntot-kX8dD90j7q6OIA7WyoCB6ip1tdW0BVgVWR4rfcyWaYZZnhBLpjXcGjqmsg1OO8wNVqATmiKpfvuAGrY6fpXB2h2fjueTTxmikJXmLOY-1xpVMqNFUqiwOiqelgUpIqpQQRSrBM04jRGHTkQvMRIQlRmTYliQUiptR0F8eoW5SFPkHYHGZocGLONGGpH8ZmG3UAfCdzq1E87SHeOkYmjYQ4TLJ4lS1W7EWuXSrBpZJwaVzaQ_6X5cLJaPzB5qb1vfwWEtJk-1-tT_9lfYa2YeVIh-eoWy9X-sJ0H3Xct-HVR1vD-8fJ9BOvDduh
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpZ07a8MwEMdFSIa2Q-mTpk8NXU3kyg-ZTiFtcJrHlEA2IdsyuLR2iJ2h3746S25SKLTQza8Dc5LuTnD_nxC6T10pBAGJspdElqM2FZbKcg9WGtiBHzM_stOa9jnzwoXzsnSXLTRotDDQVmliv47pdbQ2T3rGm71VloHGFyZUoDIOBYiK2gJ1gE7ltlGnPxqHs6080mYaGl5DNwNmGnp0m5fYVEUNRwUIkc1qkmd9etkPWWon8wyP0KEpGXFf_9Uxasn8BB3sgARP0fRJVnVPVY5FnuD3TJMz1G2R4hgKZFnCpagq0NTjLMflZgVhoizWH9j0q2ONdS7P0GL4PB-EljkowYrVkqwsX8iEMkmFSCOXSKqKmIQkQghGmGBOKmng0AhQcp76iJCYiFSqrOS4LKJUFRjnqJ0XubxAWK1nqHEi35HESWwvUiMpXZA8qY2N8JMu8hvH8NhQxOEwizfetIu98q1LObiUE58rl3aR_WW50iSNP9g8Nr7n32YFVwH_V-vLf1nfob1wPp3wyWg2vkL78EZrEK9Ru1pv5I0qRqro1ky2Tzto3lI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detection+and+mitigation+of+classes+of+attacks+in+supervisory+control+systems&rft.jtitle=Automatica+%28Oxford%29&rft.au=Carvalho%2C+Lilian+Kawakami&rft.au=Wu%2C+Yi-Chin&rft.au=Kwong%2C+Raymond&rft.au=Lafortune%2C+St%C3%A9phane&rft.date=2018-11-01&rft.pub=Elsevier+Ltd&rft.issn=0005-1098&rft.eissn=1873-2836&rft.volume=97&rft.spage=121&rft.epage=133&rft_id=info:doi/10.1016%2Fj.automatica.2018.07.017&rft.externalDocID=S0005109818303741
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon