A data analytical approach for assessing the efficacy of Operational Technology active defenses against insider threats

Progress in Nuclear Energy - Tập 124 - Trang 103339 - 2020
Arvind Sundaram1, Hany S. Abdel-Khalik1, Oussama Ashy2
1Purdue University, School of Nuclear Engineering, 400 Central Dr, West Lafayette, IN, 47906, United States
2WSC, Inc., 7196 Crestwood Blvd #300, Frederick, MD, 21703, United States

Tài liệu tham khảo

Ahmed, 2018, NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems, ASIACCS, 483, 10.1145/3196494.3196532 Brumback, 1987, A chi-square test for fault-detection in Kalman filterrs, IEEE Trans. Automat. Contr., 32, 552, 10.1109/TAC.1987.1104658 Da, 1994, Failure detection of dynamical systems with the state chi-square test, J. Guid. Contr. Dynam., 17, 10.2514/3.21193 Dridi, 2017, Prime factorization using quantum annealing and computational algebraic geometry, Sci. Rep., 7 Flammini, 2019 Givehchi, 2017, Interoperability for Industrial Cyber-Physical Systems: An Approach for Legacy Systems, IEEE Transactions on Industrial Informatics, 13, 3370, 10.1109/TII.2017.2740434 Grieves, 2014 Ibraheem, 2014, Damping low frequency oscillations in power system using quadratic Gaussian technique based control system design, Int. J. Comput. Appl., 92 Jajodia, 2011, Effectiveness of Moving Target Defenses Kalman, 1960, A new approach to linear filtering and prediction problems, Trans. ASME J. Basic Eng., 82, 35, 10.1115/1.3662552 Koulamas, 2018, Cyber-physical systems and digital twins in the industrial internet of things, Computer, 51, 95, 10.1109/MC.2018.2876181 Li, 2019, Effectiveness of model-based defenses for digitally controlled industrial systems: nuclear reactor case study, Nucl. Technol., 206, 82, 10.1080/00295450.2019.1626170 Liu, 2009 Maurer, 2007, 21 Mo, 2015, Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs, IEEE Contr. Syst. Mag., 35, 93, 10.1109/MCS.2014.2364724 Payne, 2008, Lares: An Architecture for Secure Active Monitoring using Virtualization, IEEE Symposium on Security and Privacy Peng, 2006, On the secrecy of timing-based active watermarking trace-back techniques, 15 Satchidanandan, 2016, Dynamic watermarking: active defense of networked cyber-physical systems, Proc. IEEE, 105, 219, 10.1109/JPROC.2016.2575064 Sawada, 2017, Model-based cybersecurity for control systems: modeling, design and control Sengupta, 2017 Shannon, 1949, Communication theory of secrecy systems, Bell Syst. Tech. J., 28, 656, 10.1002/j.1538-7305.1949.tb00928.x Sundaram, 2019 Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013, 214 The Colors of Noise Tsoukalas, 1997 Urbina, 2016