Cargando…
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and mul...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514691/ https://www.ncbi.nlm.nih.gov/pubmed/33266925 http://dx.doi.org/10.3390/e21020210 |
_version_ | 1783586646512369664 |
---|---|
author | Cetinkaya, Ahmet Ishii, Hideaki Hayakawa, Tomohisa |
author_facet | Cetinkaya, Ahmet Ishii, Hideaki Hayakawa, Tomohisa |
author_sort | Cetinkaya, Ahmet |
collection | PubMed |
description | In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols. |
format | Online Article Text |
id | pubmed-7514691 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-75146912020-11-09 An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses Cetinkaya, Ahmet Ishii, Hideaki Hayakawa, Tomohisa Entropy (Basel) Review In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols. MDPI 2019-02-22 /pmc/articles/PMC7514691/ /pubmed/33266925 http://dx.doi.org/10.3390/e21020210 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Cetinkaya, Ahmet Ishii, Hideaki Hayakawa, Tomohisa An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title | An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title_full | An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title_fullStr | An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title_full_unstemmed | An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title_short | An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses |
title_sort | overview on denial-of-service attacks in control systems: attack models and security analyses |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514691/ https://www.ncbi.nlm.nih.gov/pubmed/33266925 http://dx.doi.org/10.3390/e21020210 |
work_keys_str_mv | AT cetinkayaahmet anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses AT ishiihideaki anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses AT hayakawatomohisa anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses AT cetinkayaahmet overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses AT ishiihideaki overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses AT hayakawatomohisa overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses |