Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph

IEEE Transactions on Network Science and Engineering(2022)

引用 7|浏览10
暂无评分
摘要
By violating semantic constraints that the control process impose, the semantic attack leads the Industry Control Systems (ICS) into an undesirable state or critical state. The spread of semantic attack has caused huge economic losses and casualties to critical infrastructure. Therefore, detecting semantic attack is referred to an urgent and critical task. However, few existing detecting technique...
更多
查看译文
关键词
Semantics,Protocols,Process control,Integrated circuits,Intrusion detection,Valves,Support vector machines
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要