Interval forecasting of cyber-attacks on industrial control systems

被引:1
|
作者
Ivanyo, Y. M. [1 ]
Krakovsky, Y. M. [2 ]
Luzgin, A. N. [3 ]
机构
[1] Irkutsk State Agrarian Univ, Molodezhny Settlement, Irkutsk 664038, Irkutsk Region, Russia
[2] Irkutsk State Univ Railway Transport, 15 Chernyshevsky St, Irkutsk 664074, Russia
[3] Adm Irkutsk City, 14 Lenina St, Irkutsk 660025, Russia
关键词
D O I
10.1088/1757-899X/327/2/022044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group 'zeppo-norcal' was selected as the indicator.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Bibliometric Analysis on Cyber-Attacks in Naval Sensors and Systems
    Pires de Albuquerque, Carlos Eduardo
    Santos Machado, Raphael Carlos
    de Sa, Alan Oliveira
    Barros de Toledo, Carlos Rafael
    [J]. 2022 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR THE SEA LEARNING TO MEASURE SEA HEALTH PARAMETERS (METROSEA), 2022, : 474 - 478
  • [42] Observer-based asynchronous event-triggered control for interval type-2 fuzzy systems with cyber-attacks
    Yang, Huilan
    Wang, Xin
    Zhong, Shouming
    Shu, Lan
    [J]. INFORMATION SCIENCES, 2022, 606 : 805 - 818
  • [43] Improved event-triggered control for networked control systems under stochastic cyber-attacks
    Li, Tao
    Tang, Xiaoling
    Zhang, Haitao
    Fei, Shumin
    [J]. NEUROCOMPUTING, 2019, 350 : 33 - 43
  • [44] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [45] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    [J]. ECONOMICS LETTERS, 2023, 233
  • [46] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    [J]. SURVIVAL, 2000, 42 (03) : 89 - +
  • [47] Event-based model predictive damping control for power systems with cyber-attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    [J]. ISA TRANSACTIONS, 2023, 136 : 687 - 700
  • [48] GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks
    Zarzycki, Krzysztof
    Chaber, Patryk
    Cabaj, Krzysztof
    Lawrynczuk, Maciej
    Marusak, Piotr
    Nebeluk, Robert
    Plamowski, Sebastian
    Wojtulewicz, Andrzej
    [J]. IEEE ACCESS, 2023, 11 : 49587 - 49600
  • [49] Secure interval observer for linear continuous-time systems with discrete measurements subject to cyber-attacks
    Rabehi, Djahid
    Meslem, Nacim
    Ramdani, Nacim
    [J]. 2019 4TH CONFERENCE ON CONTROL AND FAULT TOLERANT SYSTEMS (SYSTOL), 2019, : 336 - 341
  • [50] Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems
    Kravchik, Moshe
    Biggio, Battista
    Shabtai, Asaf
    [J]. 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 116 - 125