Author: Rong Su
Publisher: CRC Press
ISBN: 1040031323
Category : Computers
Languages : en
Pages : 283
Book Description
This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
Cybersecurity of Discrete Event Systems
Author: Rong Su
Publisher: CRC Press
ISBN: 1040031323
Category : Computers
Languages : en
Pages : 283
Book Description
This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
Publisher: CRC Press
ISBN: 1040031323
Category : Computers
Languages : en
Pages : 283
Book Description
This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
Cyber Security for Discrete Event Systems
Author: Raphael Fritz
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832582754
Category : Technology & Engineering
Languages : en
Pages : 200
Book Description
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832582754
Category : Technology & Engineering
Languages : en
Pages : 200
Book Description
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
H-Systems
Author: Elena De Santis
Publisher: Springer Nature
ISBN: 3031204476
Category : Technology & Engineering
Languages : en
Pages : 305
Book Description
This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from sometimes necessarily partial information. By explaining how available measurements can be used to deduce past and future behaviours of a system, the authors extend this study of observability to embrace the properties of diagnosability and predictability. H-systems shows how continuous and discrete dynamics and their interaction affect the observability of this general class of hybrid systems and demonstrates that hybrid characteristics are not simply generalizations of well-known aspects of traditional dynamics. The authors identify conditions for state reconstruction, prediction and diagnosis of the occurrence of possibly faulty states. The formal approach to proving those properties for hybrid systems is accompanied by simple illustrative examples. For readers who are interested in the use of state estimation for controller design, the book also provides design methods for hybrid state observers and covers their application in some industrial cases. The book’s tutorial approach to the various forms of observability of hybrid systems helps to make H-systems of interest to academic researchers and graduate students working in control and to practitioners using control in an industrial environment.
Publisher: Springer Nature
ISBN: 3031204476
Category : Technology & Engineering
Languages : en
Pages : 305
Book Description
This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from sometimes necessarily partial information. By explaining how available measurements can be used to deduce past and future behaviours of a system, the authors extend this study of observability to embrace the properties of diagnosability and predictability. H-systems shows how continuous and discrete dynamics and their interaction affect the observability of this general class of hybrid systems and demonstrates that hybrid characteristics are not simply generalizations of well-known aspects of traditional dynamics. The authors identify conditions for state reconstruction, prediction and diagnosis of the occurrence of possibly faulty states. The formal approach to proving those properties for hybrid systems is accompanied by simple illustrative examples. For readers who are interested in the use of state estimation for controller design, the book also provides design methods for hybrid state observers and covers their application in some industrial cases. The book’s tutorial approach to the various forms of observability of hybrid systems helps to make H-systems of interest to academic researchers and graduate students working in control and to practitioners using control in an industrial environment.
Supervisory Control of Discrete-Event Systems
Author: W. Murray Wonham
Publisher: Springer
ISBN: 3319774522
Category : Technology & Engineering
Languages : en
Pages : 504
Book Description
This book shows how supervisory control theory (SCT) supports the formulation of various control problems of standard types, like the synthesis of controlled dynamic invariants by state feedback, and the resolution of such problems in terms of naturally definable control-theoretic concepts and properties, like reachability, controllability and observability. It exploits a simple, abstract model of controlled discrete-event systems (DES) that has proved to be tractable, appealing to control specialists, and expressive of a range of control-theoretic ideas. It allows readers to choose between automaton-based and dually language-based forms of SCT, depending on whether their preference is for an internal-structural or external-behavioral description of the problem. The monograph begins with two chapters on algebraic and linguistic preliminaries and the fundamental concepts and results of SCT are introduced. To handle complexity caused by system scale, architectural approaches—the horizontal modularity of decentralized and distributed supervision and the vertical modularity of hierarchical supervision—are introduced. Supervisory control under partial observation and state-based supervisory control are also addressed; in the latter, a vector DES model that exploits internal regularity of algebraic structure is proposed. Finally SCT is generalized to deal with timed DES by incorporating temporal features in addition to logical ones. Researchers and graduate students working with the control of discrete-event systems or who are interested in the development of supervisory control methods will find this book an invaluable aid in their studies. The text will also be of assistance to researchers in manufacturing, logistics, communications and transportation, areas which provide plentiful examples of the class of systems being discussed.
Publisher: Springer
ISBN: 3319774522
Category : Technology & Engineering
Languages : en
Pages : 504
Book Description
This book shows how supervisory control theory (SCT) supports the formulation of various control problems of standard types, like the synthesis of controlled dynamic invariants by state feedback, and the resolution of such problems in terms of naturally definable control-theoretic concepts and properties, like reachability, controllability and observability. It exploits a simple, abstract model of controlled discrete-event systems (DES) that has proved to be tractable, appealing to control specialists, and expressive of a range of control-theoretic ideas. It allows readers to choose between automaton-based and dually language-based forms of SCT, depending on whether their preference is for an internal-structural or external-behavioral description of the problem. The monograph begins with two chapters on algebraic and linguistic preliminaries and the fundamental concepts and results of SCT are introduced. To handle complexity caused by system scale, architectural approaches—the horizontal modularity of decentralized and distributed supervision and the vertical modularity of hierarchical supervision—are introduced. Supervisory control under partial observation and state-based supervisory control are also addressed; in the latter, a vector DES model that exploits internal regularity of algebraic structure is proposed. Finally SCT is generalized to deal with timed DES by incorporating temporal features in addition to logical ones. Researchers and graduate students working with the control of discrete-event systems or who are interested in the development of supervisory control methods will find this book an invaluable aid in their studies. The text will also be of assistance to researchers in manufacturing, logistics, communications and transportation, areas which provide plentiful examples of the class of systems being discussed.
Cyber-Physical Systems
Author: Gaddadevara Matt Siddesh
Publisher: CRC Press
ISBN: 148225977X
Category : Computers
Languages : en
Pages : 623
Book Description
In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system. This allows distributed computing using wireless devices. Cyber-Physical Systems-A Computational Perspective examines various developments of CPS that are impacting our daily
Publisher: CRC Press
ISBN: 148225977X
Category : Computers
Languages : en
Pages : 623
Book Description
In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system. This allows distributed computing using wireless devices. Cyber-Physical Systems-A Computational Perspective examines various developments of CPS that are impacting our daily
Cybersecurity
Author: Tugrul U Daim
Publisher: Springer Nature
ISBN: 3031348435
Category : Business & Economics
Languages : en
Pages : 294
Book Description
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Publisher: Springer Nature
ISBN: 3031348435
Category : Business & Economics
Languages : en
Pages : 294
Book Description
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Advances in Computing, Informatics, Networking and Cybersecurity
Author: Petros Nicopolitidis
Publisher: Springer Nature
ISBN: 3030870499
Category : Computers
Languages : en
Pages : 812
Book Description
This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today’s society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
Publisher: Springer Nature
ISBN: 3030870499
Category : Computers
Languages : en
Pages : 812
Book Description
This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today’s society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
Network Science and Cybersecurity
Author: Robinson E. Pino
Publisher: Springer Science & Business Media
ISBN: 146147597X
Category : Computers
Languages : en
Pages : 283
Book Description
Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers. This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .
Publisher: Springer Science & Business Media
ISBN: 146147597X
Category : Computers
Languages : en
Pages : 283
Book Description
Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers. This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .
Introduction to Discrete Event Systems
Author: Christos G. Cassandras
Publisher: Springer Nature
ISBN: 3030722740
Category : Computers
Languages : en
Pages : 821
Book Description
This unique textbook comprehensively introduces the field of discrete event systems, offering a breadth of coverage that makes the material accessible to readers of varied backgrounds. The book emphasizes a unified modeling framework that transcends specific application areas, linking the following topics in a coherent manner: language and automata theory, supervisory control, Petri net theory, Markov chains and queueing theory, discrete-event simulation, and concurrent estimation techniques. Topics and features: detailed treatment of automata and language theory in the context of discrete event systems, including application to state estimation and diagnosis comprehensive coverage of centralized and decentralized supervisory control of partially-observed systems timed models, including timed automata and hybrid automata stochastic models for discrete event systems and controlled Markov chains discrete event simulation an introduction to stochastic hybrid systems sensitivity analysis and optimization of discrete event and hybrid systems new in the third edition: opacity properties, enhanced coverage of supervisory control, overview of latest software tools This proven textbook is essential to advanced-level students and researchers in a variety of disciplines where the study of discrete event systems is relevant: control, communications, computer engineering, computer science, manufacturing engineering, transportation networks, operations research, and industrial engineering. Christos G. Cassandras is Distinguished Professor of Engineering, Professor of Systems Engineering, and Professor of Electrical and Computer Engineering at Boston University. Stéphane Lafortune is Professor of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor.
Publisher: Springer Nature
ISBN: 3030722740
Category : Computers
Languages : en
Pages : 821
Book Description
This unique textbook comprehensively introduces the field of discrete event systems, offering a breadth of coverage that makes the material accessible to readers of varied backgrounds. The book emphasizes a unified modeling framework that transcends specific application areas, linking the following topics in a coherent manner: language and automata theory, supervisory control, Petri net theory, Markov chains and queueing theory, discrete-event simulation, and concurrent estimation techniques. Topics and features: detailed treatment of automata and language theory in the context of discrete event systems, including application to state estimation and diagnosis comprehensive coverage of centralized and decentralized supervisory control of partially-observed systems timed models, including timed automata and hybrid automata stochastic models for discrete event systems and controlled Markov chains discrete event simulation an introduction to stochastic hybrid systems sensitivity analysis and optimization of discrete event and hybrid systems new in the third edition: opacity properties, enhanced coverage of supervisory control, overview of latest software tools This proven textbook is essential to advanced-level students and researchers in a variety of disciplines where the study of discrete event systems is relevant: control, communications, computer engineering, computer science, manufacturing engineering, transportation networks, operations research, and industrial engineering. Christos G. Cassandras is Distinguished Professor of Engineering, Professor of Systems Engineering, and Professor of Electrical and Computer Engineering at Boston University. Stéphane Lafortune is Professor of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor.
Proceedings, 10th Annual Computer Security Applications Conference, December 5-9, 1994, Orlando, Florida
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 332
Book Description
Presents the proceedings of the 1994 conference. Topics include distributed security, security for electronic commerce/electronic data interchange, secure DBMS, Internet security, firewalls, security engineering, and CMWs on the desktop. No index. Annotation copyright Book News, Inc. Portland, Or.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 332
Book Description
Presents the proceedings of the 1994 conference. Topics include distributed security, security for electronic commerce/electronic data interchange, secure DBMS, Internet security, firewalls, security engineering, and CMWs on the desktop. No index. Annotation copyright Book News, Inc. Portland, Or.