m (Scipediacontent moved page Draft Content 712777053 to Butts et al 2010a)
 
Line 3: Line 3:
  
 
This paper presents a model for expressing control system failures and attacks on control protocols that involve the exchange of messages. Control failures and attacks are modeled using the notion of an attacker who can block and/or fabricate messages. These two attack mechanisms can cover a variety of scenarios ranging from control failures in the Waterloo Campaign to cyber attacks on oil pipelines. The model helps provide a comprehensive understanding of control system failures and attacks, which supports the development of strategies for attack as well as defense.
 
This paper presents a model for expressing control system failures and attacks on control protocols that involve the exchange of messages. Control failures and attacks are modeled using the notion of an attacker who can block and/or fabricate messages. These two attack mechanisms can cover a variety of scenarios ranging from control failures in the Waterloo Campaign to cyber attacks on oil pipelines. The model helps provide a comprehensive understanding of control system failures and attacks, which supports the development of strategies for attack as well as defense.
 
Document type: Part of book or chapter of book
 
 
== Full document ==
 
<pdf>Media:Draft_Content_712777053-beopen4026-5943-document.pdf</pdf>
 
  
  
Line 16: Line 11:
 
* [https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf]
 
* [https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf]
  
* [http://www.springerlink.com/index/pdf/10.1007/978-3-642-16806-2_4 http://www.springerlink.com/index/pdf/10.1007/978-3-642-16806-2_4],[http://dx.doi.org/10.1007/978-3-642-16806-2_4 http://dx.doi.org/10.1007/978-3-642-16806-2_4]
+
* [http://link.springer.com/content/pdf/10.1007/978-3-642-16806-2_4.pdf http://link.springer.com/content/pdf/10.1007/978-3-642-16806-2_4.pdf],
 +
: [http://dx.doi.org/10.1007/978-3-642-16806-2_4 http://dx.doi.org/10.1007/978-3-642-16806-2_4]
  
* [https://link.springer.com/chapter/10.1007/978-3-642-16806-2_4 https://link.springer.com/chapter/10.1007/978-3-642-16806-2_4],[https://rd.springer.com/chapter/10.1007/978-3-642-16806-2_4 https://rd.springer.com/chapter/10.1007/978-3-642-16806-2_4],[https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf https://link.springer.com/content/pdf/10.1007%2F978-3-642-16806-2_4.pdf],[https://academic.microsoft.com/#/detail/1589909058 https://academic.microsoft.com/#/detail/1589909058]
+
* [https://link.springer.com/chapter/10.1007%2F978-3-642-16806-2_4 https://link.springer.com/chapter/10.1007%2F978-3-642-16806-2_4],
 +
: [https://rd.springer.com/chapter/10.1007/978-3-642-16806-2_4 https://rd.springer.com/chapter/10.1007/978-3-642-16806-2_4],
 +
: [https://www.scipedia.com/public/Butts_et_al_2010a https://www.scipedia.com/public/Butts_et_al_2010a],
 +
: [https://dblp.uni-trier.de/db/conf/ifip11-10/iccip2010.html#ButtsRS10 https://dblp.uni-trier.de/db/conf/ifip11-10/iccip2010.html#ButtsRS10],
 +
: [https://academic.microsoft.com/#/detail/1589909058 https://academic.microsoft.com/#/detail/1589909058]

Latest revision as of 16:07, 21 January 2021

Abstract

This paper presents a model for expressing control system failures and attacks on control protocols that involve the exchange of messages. Control failures and attacks are modeled using the notion of an attacker who can block and/or fabricate messages. These two attack mechanisms can cover a variety of scenarios ranging from control failures in the Waterloo Campaign to cyber attacks on oil pipelines. The model helps provide a comprehensive understanding of control system failures and attacks, which supports the development of strategies for attack as well as defense.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.1007/978-3-642-16806-2_4
https://rd.springer.com/chapter/10.1007/978-3-642-16806-2_4,
https://www.scipedia.com/public/Butts_et_al_2010a,
https://dblp.uni-trier.de/db/conf/ifip11-10/iccip2010.html#ButtsRS10,
https://academic.microsoft.com/#/detail/1589909058
Back to Top

Document information

Published on 01/01/2010

Volume 2010, 2010
DOI: 10.1007/978-3-642-16806-2_4
Licence: CC BY-NC-SA license

Document Score

0

Views 2
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?