Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
by
Kukiełka, Krzysztof
, Syfert, Michał
, Ordys, Andrzej
, Kościelny, Jan Maciej
, Wnuk, Paweł
, Możaryn, Jakub
in
Control systems
/ cyber-attack detection
/ cyber-attacks isolation
/ Cyberterrorism
/ Data exchange
/ Detectors
/ failure detection
/ Fault diagnosis
/ Hackers
/ Human error
/ Information technology
/ Integrated approach
/ Malware
/ Network security
/ Power
/ Shutdowns
/ Software
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
by
Kukiełka, Krzysztof
, Syfert, Michał
, Ordys, Andrzej
, Kościelny, Jan Maciej
, Wnuk, Paweł
, Możaryn, Jakub
in
Control systems
/ cyber-attack detection
/ cyber-attacks isolation
/ Cyberterrorism
/ Data exchange
/ Detectors
/ failure detection
/ Fault diagnosis
/ Hackers
/ Human error
/ Information technology
/ Integrated approach
/ Malware
/ Network security
/ Power
/ Shutdowns
/ Software
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
by
Kukiełka, Krzysztof
, Syfert, Michał
, Ordys, Andrzej
, Kościelny, Jan Maciej
, Wnuk, Paweł
, Możaryn, Jakub
in
Control systems
/ cyber-attack detection
/ cyber-attacks isolation
/ Cyberterrorism
/ Data exchange
/ Detectors
/ failure detection
/ Fault diagnosis
/ Hackers
/ Human error
/ Information technology
/ Integrated approach
/ Malware
/ Network security
/ Power
/ Shutdowns
/ Software
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
Journal Article
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
2022
Request Book From Autostore
and Choose the Collection Method
Overview
This paper is concerned with the issue of the diagnostics of process faults and the detection of cyber-attacks in industrial control systems. This problem is of significant importance to energy production and distribution, which, being part of critical infrastructure, is usually equipped with process diagnostics and, at the same time, is often subject to cyber-attacks. A commonly used approach would be to separate the two types of anomalies. The detection of process faults would be handled by a control team, often with a help of dedicated diagnostic tools, whereas the detection of cyber-attacks would be handled by an information technology team. In this article, it is postulated here that the two can be usefully merged together into one, comprehensive, anomaly detection system. For this purpose, firstly, the main types of cyber-attacks and the main methods of detecting cyber-attacks are being reviewed. Subsequently, in the analogy to “process fault”—a term well established in process diagnostics—the term “cyber-fault” is introduced. Within this context a cyber-attack is considered as a vector containing a number of cyber-faults. Next, it is explained how methods used in process diagnostics for fault detection and isolation can be applied to the detection of cyber-attacks and, in some cases, also to isolation of the components of such attacks, i.e., cyber-faults. A laboratory stand and a simulator have been developed to test the proposed approach. Some test results are presented, demonstrating that, similarly to equipment/process faults, residua can be established and cyber-faults can be identified based on the mismatch between the real data from the system and the outputs of the simulation model.
Publisher
MDPI AG
This website uses cookies to ensure you get the best experience on our website.