Detection and mitigation of classes of attacks in supervisory control systems
The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable...
Saved in:
Published in | Automatica (Oxford) Vol. 97; pp. 121 - 133 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.11.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed “GF-safe controllability”, is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example. |
---|---|
AbstractList | The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection and mitigation in supervisory control systems, where the attacker has the ability to enable or disable vulnerable actuator commands and erase or insert vulnerable sensor readings. We present a mathematical model for the system under certain classes of actuator enablement attacks, sensor erasure attacks, or sensor insertion attacks. We then propose a defense strategy that aims to detect such attacks online and disables all controllable events after an attack is detected. We develop an algorithmic procedure for verifying whether the system can prevent damage from the attacks considered with the proposed defense strategy, where damage is modeled as the reachability of a pre-defined set of unsafe system states. The technical condition of interest that is necessary and sufficient in this context, termed “GF-safe controllability”, is characterized. We show that the verification of GF-safe controllability can be performed using diagnoser or verifier automata. Finally, we illustrate the methodology with a traffic control system example. |
Author | Carvalho, Lilian Kawakami Lafortune, Stéphane Wu, Yi-Chin Kwong, Raymond |
Author_xml | – sequence: 1 givenname: Lilian Kawakami surname: Carvalho fullname: Carvalho, Lilian Kawakami email: lilian@dee.ufrj.br organization: Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Brazil – sequence: 2 givenname: Yi-Chin surname: Wu fullname: Wu, Yi-Chin email: yichin.wu@berkeley.edu organization: Department of EECS, University of Michigan, USA – sequence: 3 givenname: Raymond surname: Kwong fullname: Kwong, Raymond email: kwong@control.utoronto.ca organization: Department of ECE, University of Toronto, Canada – sequence: 4 givenname: Stéphane surname: Lafortune fullname: Lafortune, Stéphane email: stephane@umich.edu organization: Department of EECS, University of Michigan, USA |
BookMark | eNqNkN1KAzEQRoNUsFbfIS-w66TZ7qY3gtZfqHij12GanZXU7aZk0kLf3m0rCN7o1czAfAe-cy4GXehICKkgV6DKq2WOmxRWmLzDfAzK5FDloKoTMVSm0tnY6HIghgAwyRRMzZk4Z172Z6HMeChe7iiRSz50ErtarnzyH3g4QyNdi8zE-xVTQvfJ0neSN2uKW88h7qQLXYqhlbzjRCu-EKcNtkyX33Mk3h_u32ZP2fz18Xl2M8-cViZlFVKtDWnEZjEB0iVADTUiGjBoiob0tNALVUJV9k8ADrCholLFxCy07huNhDlyXQzMkRq7jn6FcWcV2L0Wu7Q_Wuxei4XK9lr66PWvqPPp0DhF9O1_ALdHAPUFt56iZeepc1T72Ju0dfB_Q74Afb-J2Q |
CitedBy_id | crossref_primary_10_1016_j_jfranklin_2022_09_014 crossref_primary_10_3390_s24123923 crossref_primary_10_1109_TAC_2021_3051459 crossref_primary_10_1016_j_automatica_2022_110736 crossref_primary_10_1016_j_ifacol_2023_10_1900 crossref_primary_10_1016_j_arcontrol_2021_03_007 crossref_primary_10_1109_TAC_2023_3323531 crossref_primary_10_1016_j_jpdc_2023_104780 crossref_primary_10_1109_TCYB_2022_3167483 crossref_primary_10_1109_TAC_2024_3367656 crossref_primary_10_1016_j_arcontrol_2023_100907 crossref_primary_10_1016_j_ifacol_2023_10_417 crossref_primary_10_1109_TAC_2023_3253462 crossref_primary_10_1109_LCSYS_2022_3163467 crossref_primary_10_1016_j_ifacol_2021_04_031 crossref_primary_10_1016_j_ifacol_2023_10_268 crossref_primary_10_1109_TAC_2022_3191393 crossref_primary_10_1016_j_automatica_2020_109172 crossref_primary_10_1016_j_ifacol_2024_07_004 crossref_primary_10_1109_TSMC_2022_3225870 crossref_primary_10_1016_j_ifacol_2024_07_006 crossref_primary_10_1080_00207179_2019_1690691 crossref_primary_10_1109_TAC_2021_3094737 crossref_primary_10_1109_TAC_2022_3218545 crossref_primary_10_1109_TCSII_2020_3028105 crossref_primary_10_1016_j_ifacol_2024_07_002 crossref_primary_10_1109_TCNS_2023_3312249 crossref_primary_10_1109_LCSYS_2022_3168926 crossref_primary_10_1109_TAC_2020_3004326 crossref_primary_10_1109_TAC_2023_3329341 crossref_primary_10_1016_j_nahs_2021_101111 crossref_primary_10_1016_j_ifacol_2021_04_001 crossref_primary_10_1016_j_nahs_2021_101073 crossref_primary_10_1109_ACCESS_2021_3135870 crossref_primary_10_1007_s10626_021_00348_y crossref_primary_10_1016_j_ifacol_2020_12_2288 crossref_primary_10_1016_j_ifacol_2020_12_2321 crossref_primary_10_1016_j_automatica_2021_109605 crossref_primary_10_1016_j_ifacol_2021_04_003 crossref_primary_10_1109_TAC_2021_3063699 crossref_primary_10_1007_s10626_024_00408_z crossref_primary_10_1016_j_jfranklin_2024_106887 crossref_primary_10_1016_j_ifacol_2021_04_010 crossref_primary_10_1016_j_ins_2021_03_033 crossref_primary_10_1109_JAS_2024_124680 crossref_primary_10_1016_j_ifacol_2023_10_1515 crossref_primary_10_1109_TASE_2020_3041207 crossref_primary_10_1016_j_nahs_2021_101087 crossref_primary_10_3390_math12172635 crossref_primary_10_1007_s10626_021_00356_y crossref_primary_10_1007_s10626_020_00312_2 crossref_primary_10_1016_j_automatica_2023_111330 crossref_primary_10_1007_s11424_025_4263_8 crossref_primary_10_1109_TASE_2021_3076697 crossref_primary_10_1016_j_nahs_2021_101057 crossref_primary_10_1007_s10626_021_00351_3 crossref_primary_10_1109_JAS_2024_124596 crossref_primary_10_1109_TII_2020_2987629 crossref_primary_10_1007_s40313_018_0420_9 crossref_primary_10_1016_j_ifacol_2022_10_330 crossref_primary_10_1109_TAC_2021_3091438 crossref_primary_10_1016_j_ifacol_2024_07_031 crossref_primary_10_1016_j_ifacol_2024_07_033 crossref_primary_10_1016_j_ifacol_2024_07_032 crossref_primary_10_1016_j_ifacol_2024_07_034 crossref_primary_10_1016_j_ifacol_2021_04_069 crossref_primary_10_1109_ACCESS_2020_2977423 crossref_primary_10_1109_TCSII_2022_3195182 crossref_primary_10_1016_j_ifacol_2022_10_321 crossref_primary_10_1109_JAS_2022_105548 crossref_primary_10_1109_OJCSYS_2023_3290408 crossref_primary_10_1007_s10626_022_00369_1 crossref_primary_10_1016_j_nahs_2022_101162 crossref_primary_10_1038_s41598_022_19737_w crossref_primary_10_1016_j_automatica_2021_109714 crossref_primary_10_1109_TSMC_2021_3051096 crossref_primary_10_1016_j_ifacol_2020_12_2791 crossref_primary_10_1016_j_ins_2022_05_102 crossref_primary_10_1016_j_automatica_2023_111076 crossref_primary_10_1109_JAS_2023_123702 crossref_primary_10_1155_2021_6646799 crossref_primary_10_1109_TASE_2024_3416821 crossref_primary_10_1109_TAC_2023_3339497 crossref_primary_10_1109_TIE_2023_3281698 crossref_primary_10_1016_j_ins_2022_11_100 crossref_primary_10_1109_TAC_2024_3492955 crossref_primary_10_3390_s24144445 crossref_primary_10_1371_journal_pone_0314104 crossref_primary_10_1016_j_jfranklin_2020_12_004 crossref_primary_10_3390_math11102313 crossref_primary_10_1016_j_ins_2024_120145 crossref_primary_10_1016_j_ifacol_2021_04_048 crossref_primary_10_1016_j_ifacol_2021_04_047 crossref_primary_10_1109_LCSYS_2022_3168735 crossref_primary_10_1007_s12555_023_0200_6 crossref_primary_10_1016_j_automatica_2024_112004 crossref_primary_10_3390_math11040943 crossref_primary_10_1155_2020_8887933 crossref_primary_10_3390_app11219790 crossref_primary_10_1007_s10626_024_00401_6 |
Cites_doi | 10.1109/5.21072 10.1016/j.automatica.2011.01.007 10.1109/TAC.2002.802763 10.1109/DCDS.2011.5970312 10.1109/9.412626 10.1109/TSMC.2013.2291538 10.1109/TII.2009.2028135 10.1016/j.ifacol.2015.06.483 10.1145/1592451.1592452 10.1109/TAC.2011.2124950 10.1016/j.cose.2009.06.008 10.1109/TAC.2014.2358811 10.1109/WODES.2016.7497863 10.1016/j.automatica.2012.06.042 10.1109/9.940942 10.1109/JPROC.2011.2165689 10.3182/20140514-3-FR-4046.00092 10.1109/ICDCS.Workshops.2008.40 10.1016/j.jnca.2012.05.003 10.1109/CDC.2005.1582703 10.3182/20140514-3-FR-4046.00106 |
ContentType | Journal Article |
Copyright | 2018 Elsevier Ltd |
Copyright_xml | – notice: 2018 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.automatica.2018.07.017 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1873-2836 |
EndPage | 133 |
ExternalDocumentID | 10_1016_j_automatica_2018_07_017 S0005109818303741 |
GrantInformation_xml | – fundername: Natural Sciences and Engineering Research Council of Canada grantid: RGPIN-2015-04273 funderid: http://dx.doi.org/10.13039/501100000038 – fundername: U.S. National Science Foundation grantid: CNS-1421122 funderid: http://dx.doi.org/10.13039/100000001 – fundername: Brazil’s CNPq (National Council of Technological and Scientific Development) funderid: http://dx.doi.org/10.13039/501100003593 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 23N 3R3 4.4 457 4G. 5GY 5VS 6TJ 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO ABDEX ABFNM ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACBEA ACDAQ ACGFO ACGFS ACNNM ACRLP ADBBV ADEZE ADIYS ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHPGS AI. AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ APLSM ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA K-O KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SSB SSD SST SSZ T5K T9H TAE TN5 VH1 WH7 WUQ X6Y XFK XPP ZMT ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c318t-7aed38e3aafb50e3600d0daaa808a84fe3943b16076e3a00c0afe471458b33283 |
IEDL.DBID | .~1 |
ISSN | 0005-1098 |
IngestDate | Tue Jul 01 00:44:02 EDT 2025 Thu Apr 24 23:02:19 EDT 2025 Fri Feb 23 02:47:22 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Cyber-attacks Discrete event systems Failure diagnosis Automata |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c318t-7aed38e3aafb50e3600d0daaa808a84fe3943b16076e3a00c0afe471458b33283 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1016_j_automatica_2018_07_017 crossref_citationtrail_10_1016_j_automatica_2018_07_017 elsevier_sciencedirect_doi_10_1016_j_automatica_2018_07_017 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | November 2018 2018-11-00 |
PublicationDateYYYYMMDD | 2018-11-01 |
PublicationDate_xml | – month: 11 year: 2018 text: November 2018 |
PublicationDecade | 2010 |
PublicationTitle | Automatica (Oxford) |
PublicationYear | 2018 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Wonham, W. M. (2013). Supervisory control of discrete-event systems. Technical Report. University of Toronto. Ramadge, Wonham (b17) 1989; 77 (pp. 294–299). Cachan, France. Nooruldeen, Schmidt (b15) 2015; 60 Thorsley, Teneketzis (b22) 2006 Moreira, Jesus, Basilio (b13) 2011; 56 Sampath, Sengupta, Lafortune, Sinnamohideen, Teneketzis (b19) 1995; 40 (pp. 428–433). Yoo, Lafortune (b25) 2002; 47 Faraut, Piétrac, Niel (b8) 2009; 5 Carvalho, Basilio, Moreira (b4) 2012; 48 Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2016). Detection and prevention of actuator enablement attacks in supervisory control systems. In Banerjee, Venkatasubramanian, Mukherjee, Gupta (b2) 2012; 100 Paoli, Sartini, Lafortune (b16) 2011; 47 Cassandras, Lafortune (b7) 2008 Nke, Y., & Lunze, J. (2011). Online control reconfiguration for a faulty manufacturing process. In Hoffman, Zage, Nita-Rotaru (b9) 2009; 42 (pp. 3493–3498). Rohloff, K. (2005). Sensor failure tolerant supervisory control. In Wen, Kumar, Huang (b23) 2014; 44 Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In . Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2018). Detection and mitigation of classes of attacks in supervisory control systems. ArXiv e-prints - (pp. 495–500). Modi, Patel, Borisaniya, Patel, Patel, Rajarajan (b11) 2013; 36 Moor, T. (2015). Fault-tolerant supervisory control. In (pp. 19–24). Shengbing, Zhongdong, Chandra, Kumar (b20) 2001; 46 Alves, M. V. S., Basilio, J. C., da Cunha, A. E. C., Carvalho, L. K., & Moreira, M. V. (2014). Robust supervisory control against intermittent loss of observations. In (pp. 298–305). Xi’an, China. Lazarevic, Kumar, Srivastava (b10) 2005 Sulek, A. N., & Schmidt, K. W. (2014). Computation of supervisors for fault-recovery and repair for discrete event systems. In Zhou, Leckie, Karunasekera (b26) 2010; 29 Moreira (10.1016/j.automatica.2018.07.017_b13) 2011; 56 10.1016/j.automatica.2018.07.017_b18 10.1016/j.automatica.2018.07.017_b12 10.1016/j.automatica.2018.07.017_b14 Lazarevic (10.1016/j.automatica.2018.07.017_b10) 2005 Shengbing (10.1016/j.automatica.2018.07.017_b20) 2001; 46 Sampath (10.1016/j.automatica.2018.07.017_b19) 1995; 40 Hoffman (10.1016/j.automatica.2018.07.017_b9) 2009; 42 Zhou (10.1016/j.automatica.2018.07.017_b26) 2010; 29 Cassandras (10.1016/j.automatica.2018.07.017_b7) 2008 Thorsley (10.1016/j.automatica.2018.07.017_b22) 2006 Banerjee (10.1016/j.automatica.2018.07.017_b2) 2012; 100 10.1016/j.automatica.2018.07.017_b6 10.1016/j.automatica.2018.07.017_b24 10.1016/j.automatica.2018.07.017_b5 Ramadge (10.1016/j.automatica.2018.07.017_b17) 1989; 77 Wen (10.1016/j.automatica.2018.07.017_b23) 2014; 44 10.1016/j.automatica.2018.07.017_b3 10.1016/j.automatica.2018.07.017_b21 Paoli (10.1016/j.automatica.2018.07.017_b16) 2011; 47 Faraut (10.1016/j.automatica.2018.07.017_b8) 2009; 5 10.1016/j.automatica.2018.07.017_b1 Nooruldeen (10.1016/j.automatica.2018.07.017_b15) 2015; 60 Carvalho (10.1016/j.automatica.2018.07.017_b4) 2012; 48 Modi (10.1016/j.automatica.2018.07.017_b11) 2013; 36 Yoo (10.1016/j.automatica.2018.07.017_b25) 2002; 47 |
References_xml | – volume: 44 start-page: 1056 year: 2014 end-page: 1066 ident: b23 article-title: Framework for optimal fault-tolerant control synthesis: Maximize pre-fault while minimize post-fault behaviors publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems – volume: 56 start-page: 1679 year: 2011 end-page: 1684 ident: b13 article-title: Polynomial time verification of decentralized diagnosability of discrete event systems publication-title: IEEE Transactions on Automatic Control – volume: 5 start-page: 443 year: 2009 end-page: 453 ident: b8 article-title: Formal approach to multimodal control design: Application to mode switching publication-title: IEEE Transactions on Industrial Informatics – volume: 60 start-page: 1630 year: 2015 end-page: 1634 ident: b15 article-title: State attraction under language specification for the reconfiguration of discrete event systems publication-title: IEEE Transactions on Automatic Control – reference: Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2018). Detection and mitigation of classes of attacks in supervisory control systems. ArXiv e-prints - – volume: 77 start-page: 81 year: 1989 end-page: 98 ident: b17 article-title: The control of discrete-event systems publication-title: Proceedings of the IEEE – volume: 48 start-page: 2068 year: 2012 end-page: 2078 ident: b4 article-title: Robust diagnosis of discrete-event systems against intermittent loss of observations publication-title: Automatica – start-page: 6047 year: 2006 end-page: 6054 ident: b22 article-title: Intrusion detection in controlled discrete event systems publication-title: Proc. 45th IEEE conference on decision and control – reference: (pp. 294–299). Cachan, France. – volume: 29 start-page: 124 year: 2010 end-page: 140 ident: b26 article-title: A survey of coordinated attacks and collaborative intrusion detection publication-title: Computers & Security – volume: 47 start-page: 639 year: 2011 end-page: 649 ident: b16 article-title: Active fault tolerant control of discrete event systems using online diagnostics publication-title: Automatica – start-page: 19 year: 2005 end-page: 78 ident: b10 article-title: Intrusion detection: A survey publication-title: Managing cyber threats – volume: 100 start-page: 283 year: 2012 end-page: 299 ident: b2 article-title: Ensuring safety, security, and sustainability of mission-critical cyber–physical systems publication-title: Proceedings of the IEEE – reference: Moor, T. (2015). Fault-tolerant supervisory control. In – year: 2008 ident: b7 article-title: Introduction to discrete event systems – volume: 46 start-page: 1318 year: 2001 end-page: 1321 ident: b20 article-title: A polynomial algorithm for testing diagnosability of discrete-event systems publication-title: IEEE Transactions on Automatic Control – reference: (pp. 19–24). – reference: Rohloff, K. (2005). Sensor failure tolerant supervisory control. In – volume: 42 start-page: 1 year: 2009 end-page: 31 ident: b9 article-title: A survey of attack and defense techniques for reputation systems publication-title: ACM Computing Surveys – volume: 47 start-page: 1491 year: 2002 end-page: 1495 ident: b25 article-title: Polynomial-time verification of diagnosability of partially observed discrete-event systems publication-title: IEEE Transactions on Automatic Control – volume: 36 start-page: 42 year: 2013 end-page: 57 ident: b11 article-title: A survey of intrusion detection techniques in cloud publication-title: Journal of Network and Computer Applications – reference: Sulek, A. N., & Schmidt, K. W. (2014). Computation of supervisors for fault-recovery and repair for discrete event systems. In – reference: Wonham, W. M. (2013). Supervisory control of discrete-event systems. Technical Report. University of Toronto. – reference: Alves, M. V. S., Basilio, J. C., da Cunha, A. E. C., Carvalho, L. K., & Moreira, M. V. (2014). Robust supervisory control against intermittent loss of observations. In – reference: . – reference: Nke, Y., & Lunze, J. (2011). Online control reconfiguration for a faulty manufacturing process. In – volume: 40 start-page: 1555 year: 1995 end-page: 1575 ident: b19 article-title: Diagnosability of discrete-event systems publication-title: IEEE Transactions on Automatic Control – reference: (pp. 428–433). – reference: Cardenas, A. A., Amin, S., & Sastry, S. (2008). Secure control: Towards survivable cyber-physical systems. In – reference: (pp. 3493–3498). – reference: (pp. 495–500). – reference: Carvalho, L. K., Wu, Y. C., Kwong, R., & Lafortune, S. (2016). Detection and prevention of actuator enablement attacks in supervisory control systems. In – reference: (pp. 298–305). Xi’an, China. – volume: 77 start-page: 81 year: 1989 ident: 10.1016/j.automatica.2018.07.017_b17 article-title: The control of discrete-event systems publication-title: Proceedings of the IEEE doi: 10.1109/5.21072 – start-page: 6047 year: 2006 ident: 10.1016/j.automatica.2018.07.017_b22 article-title: Intrusion detection in controlled discrete event systems – volume: 47 start-page: 639 year: 2011 ident: 10.1016/j.automatica.2018.07.017_b16 article-title: Active fault tolerant control of discrete event systems using online diagnostics publication-title: Automatica doi: 10.1016/j.automatica.2011.01.007 – volume: 47 start-page: 1491 year: 2002 ident: 10.1016/j.automatica.2018.07.017_b25 article-title: Polynomial-time verification of diagnosability of partially observed discrete-event systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2002.802763 – ident: 10.1016/j.automatica.2018.07.017_b14 doi: 10.1109/DCDS.2011.5970312 – volume: 40 start-page: 1555 year: 1995 ident: 10.1016/j.automatica.2018.07.017_b19 article-title: Diagnosability of discrete-event systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/9.412626 – volume: 44 start-page: 1056 year: 2014 ident: 10.1016/j.automatica.2018.07.017_b23 article-title: Framework for optimal fault-tolerant control synthesis: Maximize pre-fault while minimize post-fault behaviors publication-title: IEEE Transactions on Systems, Man, and Cybernetics: Systems doi: 10.1109/TSMC.2013.2291538 – volume: 5 start-page: 443 year: 2009 ident: 10.1016/j.automatica.2018.07.017_b8 article-title: Formal approach to multimodal control design: Application to mode switching publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2009.2028135 – ident: 10.1016/j.automatica.2018.07.017_b12 doi: 10.1016/j.ifacol.2015.06.483 – volume: 42 start-page: 1 year: 2009 ident: 10.1016/j.automatica.2018.07.017_b9 article-title: A survey of attack and defense techniques for reputation systems publication-title: ACM Computing Surveys doi: 10.1145/1592451.1592452 – start-page: 19 year: 2005 ident: 10.1016/j.automatica.2018.07.017_b10 article-title: Intrusion detection: A survey – ident: 10.1016/j.automatica.2018.07.017_b6 – volume: 56 start-page: 1679 year: 2011 ident: 10.1016/j.automatica.2018.07.017_b13 article-title: Polynomial time verification of decentralized diagnosability of discrete event systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2011.2124950 – ident: 10.1016/j.automatica.2018.07.017_b24 – volume: 29 start-page: 124 year: 2010 ident: 10.1016/j.automatica.2018.07.017_b26 article-title: A survey of coordinated attacks and collaborative intrusion detection publication-title: Computers & Security doi: 10.1016/j.cose.2009.06.008 – year: 2008 ident: 10.1016/j.automatica.2018.07.017_b7 – volume: 60 start-page: 1630 year: 2015 ident: 10.1016/j.automatica.2018.07.017_b15 article-title: State attraction under language specification for the reconfiguration of discrete event systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2014.2358811 – ident: 10.1016/j.automatica.2018.07.017_b5 doi: 10.1109/WODES.2016.7497863 – volume: 48 start-page: 2068 year: 2012 ident: 10.1016/j.automatica.2018.07.017_b4 article-title: Robust diagnosis of discrete-event systems against intermittent loss of observations publication-title: Automatica doi: 10.1016/j.automatica.2012.06.042 – volume: 46 start-page: 1318 year: 2001 ident: 10.1016/j.automatica.2018.07.017_b20 article-title: A polynomial algorithm for testing diagnosability of discrete-event systems publication-title: IEEE Transactions on Automatic Control doi: 10.1109/9.940942 – volume: 100 start-page: 283 year: 2012 ident: 10.1016/j.automatica.2018.07.017_b2 article-title: Ensuring safety, security, and sustainability of mission-critical cyber–physical systems publication-title: Proceedings of the IEEE doi: 10.1109/JPROC.2011.2165689 – ident: 10.1016/j.automatica.2018.07.017_b1 doi: 10.3182/20140514-3-FR-4046.00092 – ident: 10.1016/j.automatica.2018.07.017_b3 doi: 10.1109/ICDCS.Workshops.2008.40 – volume: 36 start-page: 42 year: 2013 ident: 10.1016/j.automatica.2018.07.017_b11 article-title: A survey of intrusion detection techniques in cloud publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2012.05.003 – ident: 10.1016/j.automatica.2018.07.017_b18 doi: 10.1109/CDC.2005.1582703 – ident: 10.1016/j.automatica.2018.07.017_b21 doi: 10.3182/20140514-3-FR-4046.00106 |
SSID | ssj0004182 |
Score | 2.617956 |
Snippet | The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 121 |
SubjectTerms | Automata Cyber-attacks Discrete event systems Failure diagnosis |
Title | Detection and mitigation of classes of attacks in supervisory control systems |
URI | https://dx.doi.org/10.1016/j.automatica.2018.07.017 |
Volume | 97 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFA5jXvQg_sT5Y-TgtS41aZPiaUzHVNzJwW4hbVOoaDvW7uDFv928pHUTBAVvTemD8vLy3gt83_cQuswCrRQBinKYxh4zlwrPVLlrL4v8iCeCx35m1T6n4WTGHubBvINGLRcGYJVN7nc53Wbr5s2g8eZgkefA8YWAikzFoSCiYhnsjEOUX32sYR7MF04x3CpuRqJB8ziMl1rVpVVGBQUiX1gZTzu67IcStVF2xntot-kX8dD90j7q6OIA7WyoCB6ip1tdW0BVgVWR4rfcyWaYZZnhBLpjXcGjqmsg1OO8wNVqATmiKpfvuAGrY6fpXB2h2fjueTTxmikJXmLOY-1xpVMqNFUqiwOiqelgUpIqpQQRSrBM04jRGHTkQvMRIQlRmTYliQUiptR0F8eoW5SFPkHYHGZocGLONGGpH8ZmG3UAfCdzq1E87SHeOkYmjYQ4TLJ4lS1W7EWuXSrBpZJwaVzaQ_6X5cLJaPzB5qb1vfwWEtJk-1-tT_9lfYa2YeVIh-eoWy9X-sJ0H3Xct-HVR1vD-8fJ9BOvDduh |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpZ07a8MwEMdFSIa2Q-mTpk8NXU3kyg-ZTiFtcJrHlEA2IdsyuLR2iJ2h3746S25SKLTQza8Dc5LuTnD_nxC6T10pBAGJspdElqM2FZbKcg9WGtiBHzM_stOa9jnzwoXzsnSXLTRotDDQVmliv47pdbQ2T3rGm71VloHGFyZUoDIOBYiK2gJ1gE7ltlGnPxqHs6080mYaGl5DNwNmGnp0m5fYVEUNRwUIkc1qkmd9etkPWWon8wyP0KEpGXFf_9Uxasn8BB3sgARP0fRJVnVPVY5FnuD3TJMz1G2R4hgKZFnCpagq0NTjLMflZgVhoizWH9j0q2ONdS7P0GL4PB-EljkowYrVkqwsX8iEMkmFSCOXSKqKmIQkQghGmGBOKmng0AhQcp76iJCYiFSqrOS4LKJUFRjnqJ0XubxAWK1nqHEi35HESWwvUiMpXZA8qY2N8JMu8hvH8NhQxOEwizfetIu98q1LObiUE58rl3aR_WW50iSNP9g8Nr7n32YFVwH_V-vLf1nfob1wPp3wyWg2vkL78EZrEK9Ru1pv5I0qRqro1ky2Tzto3lI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detection+and+mitigation+of+classes+of+attacks+in+supervisory+control+systems&rft.jtitle=Automatica+%28Oxford%29&rft.au=Carvalho%2C+Lilian+Kawakami&rft.au=Wu%2C+Yi-Chin&rft.au=Kwong%2C+Raymond&rft.au=Lafortune%2C+St%C3%A9phane&rft.date=2018-11-01&rft.pub=Elsevier+Ltd&rft.issn=0005-1098&rft.eissn=1873-2836&rft.volume=97&rft.spage=121&rft.epage=133&rft_id=info:doi/10.1016%2Fj.automatica.2018.07.017&rft.externalDocID=S0005109818303741 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon |