Cybersecurity Of Discrete Event Systems


Download Cybersecurity Of Discrete Event Systems PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Cybersecurity Of Discrete Event Systems book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Cybersecurity of Discrete Event Systems


Cybersecurity of Discrete Event Systems

Author: Rong Su

language: en

Publisher: CRC Press

Release Date: 2024-09-05


DOWNLOAD





This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.

Cyber Security for Discrete Event Systems


Cyber Security for Discrete Event Systems

Author: Raphael Fritz

language: en

Publisher: Logos Verlag Berlin GmbH

Release Date: 2024-03-25


DOWNLOAD





Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.

Cybersecurity of Discrete Event Dynamic Systems


Cybersecurity of Discrete Event Dynamic Systems

Author: Rong Su, (El

language: en

Publisher:

Release Date: 2024-05


DOWNLOAD





"Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata. "Smart attacks" cannot be detected by the supervisor until an irreversible process towards ensured damage occurs. An attack may be conducted in either the observation channel (i.e., the supervisor's input of the supervisor) or the command channel (i.e., the supervisor's output), or both simultaneously. Therefore, defense strategies against these attacks are urgently needed. Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises three parts. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Secondly, he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Finally, he presents resilient defense strategies against relevant types of attacks. By focusing on conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout the book. Readers are recommended to have a background in formal language theory"--