Detecting intrusions in control systems: a rule of thumb, its justification and illustrations

06/16/2018
by   Nadezhda Gribkova, et al.
0

Control systems are exposed to unintentional errors, deliberate intrusions, false data injection attacks, and various other disruptions. In this paper we propose, justify, and illustrate a rule of thumb for detecting, or confirming the absence of, such disruptions. To facilitate the use of the rule, we rigorously discuss background results that delineate the boundaries of the rule's applicability. We also discuss ways to further widen the applicability of the proposed intrusion-detection methodology.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/03/2022

CANShield: Signal-based Intrusion Detection for Controller Area Networks

Modern vehicles rely on a fleet of electronic control units (ECUs) conne...
research
12/01/2012

An Evolution Strategy Approach toward Rule-set Generation for Network Intrusion Detection Systems (IDS)

With the increasing number of intrusions in system and network infrastru...
research
11/08/2017

Privacy Preservation Intrusion Detection Technique for SCADA Systems

Supervisory Control and Data Acquisition (SCADA) systems face the absenc...
research
04/18/2019

Intrusion Detection Mechanism Using Fuzzy Rule Interpolation

Fuzzy Rule Interpolation (FRI) methods can serve deducible (interpolated...
research
03/28/2019

Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning

Evolving cybersecurity threats are a persistent challenge for systemadmi...
research
03/16/2018

A closer look on Intrusion Detection System for web applications

Intrusion Detection System (IDS) is one of the security measures being u...
research
07/27/2022

Rule 30: Solving the Chaos

This paper provides an analytical solution to the Wolfram Alpha Rule 30 ...

Please sign up or login with your details

Forgot password? Click here to reset