Hybrid-Driven-Based ${\mathcal{H}}_\infty$ Control for Networked Cascade Control Systems With Actuator Saturations and Stochastic Cyber Attacks

2019 ◽  
Vol 49 (12) ◽  
pp. 2452-2463 ◽  
Author(s):  
Jinliang Liu ◽  
Yuanyuan Gu ◽  
Xiangpeng Xie ◽  
Dong Yue ◽  
Ju H. Park
2019 ◽  
Vol 356 (16) ◽  
pp. 9451-9473 ◽  
Author(s):  
Jinliang Liu ◽  
Yuda Wang ◽  
Lijuan Zha ◽  
Huaicheng Yan

2020 ◽  
Vol 53 (4) ◽  
pp. 7-13
Author(s):  
Yike Li ◽  
Yin Tong ◽  
Alessandro Giua

Author(s):  
Claudia ARAUJO MACEDO ◽  
Jos MENTING

Cybersecurity in industrial control system environments has become a significant concern and is even more relevant in the context of critical infrastructures where control system disruption could have a profound impact on health, safety and the environment. This makes this type of system a major target for malicious activities. Notwithstanding an organization’s interest in protecting its industrial control systems against cyber-attacks, the implementation of security measures, whether technical, organizational or human, still faces resistance and is often seen as a constraint. Using the best technology to protect industrial control systems makes no sense if persons with access do not act attentively and protectively. Technical and human cybersecurity measures are intrinsically linked, and it is essential that all persons with access to these systems are fully aware of the inherent cyber risks. Organizations must also act so that staff receive appropriate training on how to keep systems continuously protected against cyber-attack when carrying out their daily tasks. These educational processes can contribute to building an effective cybersecurity culture fully reflective of management and staff attitudes, so that the availability, integrity and confidentiality of information in industrial control systems can be assured.


2005 ◽  
Vol 192 (9) ◽  
pp. 1204-1220 ◽  
Author(s):  
Wen Tan ◽  
Jizhen Liu ◽  
Tongwen Chen ◽  
Horacio J. Marquez

Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Sign in / Sign up

Export Citation Format

Share Document