Published: July 25, 2018
Citation: ACM Computing Surveys vol. 51, no. 4, article no. 76 (September 2018) pp. 1-36
Author(s)
Jairo Giraldo (University of Texas at Dallas), David Urbina (University of Texas at Dallas), Álvaro Cárdenas (University of Texas at Dallas), Junia Valente (University of Texas at Dallas), Mustafa Faisal (University of Texas at Dallas), Justin Ruths (University of Texas at Dallas), Nils Tippenhauer (Singapore University of Technology and Design), Henrik Sandberg (KTH Royal Institute of Technology), Richard Candell (NIST)
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false control commands or false sensor readings. In this article, we review previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions.
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false...
See full abstract
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false control commands or false sensor readings. In this article, we review previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions.
Hide full abstract
Keywords
security and privacy; intrusion detection systems; information systems; process control systems
Control Families
None selected