网络控制系统在存在控制器劫持攻击时的容错攻击

A. A. Yaseen, M. Bayart
{"title":"网络控制系统在存在控制器劫持攻击时的容错攻击","authors":"A. A. Yaseen, M. Bayart","doi":"10.1109/ICMCIS.2016.7496582","DOIUrl":null,"url":null,"abstract":"In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Attack-tolerant networked control system in presence of the controller hijacking attack\",\"authors\":\"A. A. Yaseen, M. Bayart\",\"doi\":\"10.1109/ICMCIS.2016.7496582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.\",\"PeriodicalId\":103155,\"journal\":{\"name\":\"2016 International Conference on Military Communications and Information Systems (ICMCIS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Military Communications and Information Systems (ICMCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMCIS.2016.7496582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCIS.2016.7496582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

介绍了网络控制系统(NCS)中容错攻击机制的一种改进方案。目标是能够应对像震网病毒这样的攻击,在这种情况下,控制器被重新编程并被劫持。该方法的优点是不需要先验的控制器数学模型。为了实现所提出的方案,设计了针对控制器劫持攻击的专用检测器。通过将检测器与NCS连接,采用数据加密标准(DES)、消息摘要(MD5)和时间戳等基本安全元素,对该方案的性能进行了评价。测试结果表明,该方法可以有效地检测和恢复被劫持的控制器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Attack-tolerant networked control system in presence of the controller hijacking attack
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Delay analysis of STDMA in grid wireless sensor networks Assisted content-based labelling and classification of documents Assessing NATO policy alignment through text analysis: An initial study Learning multi-channel power allocation against smart jammer in cognitive radio networks A novel OFDM sensing method based on CAF-max for hybrid detectors architecture
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1