dc.contributor.author | Quevedo Casín, Joseba Jokin |
dc.contributor.author | Sánchez Corrales, Helem Sabina |
dc.contributor.author | Rotondo, Damiano |
dc.contributor.author | Escobet Canal, Teresa |
dc.contributor.author | Puig Cayuela, Vicenç |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria de Sistemes, Automàtica i Informàtica Industrial |
dc.contributor.other | Institut de Robòtica i Informàtica Industrial |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Minera, Industrial i TIC |
dc.date.accessioned | 2018-12-20T12:16:32Z |
dc.date.available | 2018-12-20T12:16:32Z |
dc.date.issued | 2018-01-01 |
dc.identifier.citation | Quevedo, J., Sanchez, H., Rotondo, D., Escobet, T., Puig, V. A two-tank benchmark for detection and isolation of cyber attacks. "IFAC-PapersOnLine", 1 Gener 2018, vol. 51, núm. 24, p. 770-775. |
dc.identifier.issn | 2405-8963 |
dc.identifier.uri | http://hdl.handle.net/2117/126077 |
dc.description.abstract | This paper presents a benchmark for the detection and isolation of cyber attacks, which is a non-linear controlled interconnected system based on a two tank system. In this benchmark, a malicious attacker wants to remain hidden while stealing water by altering the signals of the sensors of the levels of the tanks. It is assumed that the attacker can steal water from the tanks using extraction pumps with pre-established flow rates and, depending on the theft and the type of sensor alteration, different attack scenarios are proposed. |
dc.format.extent | 6 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Automàtica i control |
dc.subject.lcsh | Computer crimes |
dc.subject.lcsh | Control automàtic |
dc.subject.other | Cyber attacks |
dc.subject.other | cyber physical systems |
dc.subject.other | benchmark |
dc.subject.other | replay attacks |
dc.subject.other | two-tank system |
dc.title | A two-tank benchmark for detection and isolation of cyber attacks |
dc.type | Article |
dc.subject.lemac | Delictes informàtics |
dc.subject.lemac | Automatic control |
dc.contributor.group | Universitat Politècnica de Catalunya. SAC - Sistemes Avançats de Control |
dc.identifier.doi | 10.1016/j.ifacol.2018.09.662 |
dc.relation.publisherversion | https://www.sciencedirect.com/science/article/pii/S2405896318323802 |
dc.rights.access | Open Access |
local.identifier.drac | 23501021 |
dc.description.version | Postprint (published version) |
local.citation.author | Quevedo, J.; Sanchez, H.; Rotondo, D.; Escobet, T.; Puig, V. |
local.citation.publicationName | IFAC-PapersOnLine |
local.citation.volume | 51 |
local.citation.number | 24 |
local.citation.startingPage | 770 |
local.citation.endingPage | 775 |