DocumentCode :
188815
Title :
Cyber-attack detection based on controlled invariant sets
Author :
Rosich, Albert ; Voos, Holger ; Darouach, Mohamed
Author_Institution :
Interdiscipl. Centre for Security, Univ. of Luxembourg, Luxembourg, Luxembourg
fYear :
2014
fDate :
24-27 June 2014
Firstpage :
2176
Lastpage :
2181
Abstract :
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the proposed detector is based on invariant sets in order to determine whether an attacker has hijacked the controller and perpetrated a cyber-attack. One particularity of this detection method is that few information about the controller is required. Thus, the detector becomes useful for a large range of control laws and its vulnerability can be reduced by limiting its accessibility. Finally, a simple but significant example is presented in order to show the benefits and the flaws of the proposed methodology.
Keywords :
computer network security; control engineering computing; set theory; control law; controlled invariant set; cyber-attack detection; Control systems; Detectors; Optimization; Reachability analysis; Robustness; Safety; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control Conference (ECC), 2014 European
Conference_Location :
Strasbourg
Print_ISBN :
978-3-9524269-1-3
Type :
conf
DOI :
10.1109/ECC.2014.6862206
Filename :
6862206
Link To Document :
بازگشت