Mitigating Sensor Attacks Against Industrial Control Systems
نویسندگان
چکیده
منابع مشابه
Generation of Applicative Attacks Scenarios Against Industrial Systems
In the context of security, risk analyzes are widely recognized as essential. However, such analyzes need to be replayed frequently to take into account new vulnerabilities, new protections, etc.. As exploits can now easily be found on internet, allowing a wide range of possible intruders with various capacities, motivations and resources. In particular in the case of industrial control systems...
متن کاملMitigating jamming attacks in wireless broadcast systems
Wireless communications are vulnerable to signal jamming attacks that can block mission-critical messages from being received. Spread spectrum techniques mitigate these attacks by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know the spreading pattern to expend much more effort to launch the attack. In broadcast systems, however, jamme...
متن کاملMitigating Sybil attacks on content rating systems
Online content sharing services allow users to find and share content ranging from news articles (Digg) to videos (YouTube) to URLs (StumbleUpon). Generally, such social content sites allow users to create accounts, declare friendships, upload and rate content, and locate new content by leveraging the aggregated ratings of others. For example, most highly rated content typically appears on the ...
متن کاملMitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks
Broadcast authentication is a critical security service in wireless sensor networks. There are a number of benefits to provide broadcast authentication with digital signatures, such as immediate authentication capability and the ease of managing cryptographic keys, compared with the alternative of TESLA-based approaches. Though previously considered infeasible, recent results have demonstrated ...
متن کاملIndustrial Control System Cyber Attacks
This paper presents a set of attacks against SCADA control systems. The attacks are grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service. The 4 classes are defined and each attack is described in detail. The response and measurement injection and command injection classes are subdivided into sub-classes based on attack complexity. E...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2927484