Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time

被引:3
作者
Lavrova, D. S. [1 ]
Zaitseva, E. A. [1 ]
Zegzhda, D. P. [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, Inst Appl Math & Mech, Dept Informat Secur Comp Syst, St Petersburg 195251, Russia
关键词
cyberphysical system; neutralization of cyberattacks; graph model; de Bruijn graph; overlay graph; target function;
D O I
10.3103/S0146411619050067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article proposes an approach to presenting the network infrastructure of cyberphysical systems to provide a more rapid identification of a suitable variant to rearranging the route on a graph that characterizes the target function. The proposed approach minimizes the number of used devices and allows neutralizing earlier detected cyberattacks against the system.
引用
收藏
页码:387 / 392
页数:6
相关论文
共 12 条
[1]  
[Anonymous], 2016, P 24 INT C SOFTW TEL
[2]  
Dolatdar E., 2009, WORLD ACAD SCI ENG T, V58, P1186
[3]   Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation [J].
Hong, Haifeng ;
Hu, Zhesheng ;
Guo, Ruipeng ;
Ma, Jun ;
Tian, Jiong .
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2017, 5 (01) :142-149
[4]   A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks [J].
Horre, Wouter ;
Lee, Kevin ;
Hughes, Danny ;
Michiels, Sam ;
Joosen, Wouter .
2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, :326-+
[5]   A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems [J].
Huang, Shuang ;
Zhou, Chunjie ;
Xiong, Naixue ;
Yang, Shuang-Hua ;
Qin, Yuanqing ;
Zhang, Qi .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (08) :1021-1035
[6]   Cyber-Physical Systems Security-A Survey [J].
Humayed, Abdulmalik ;
Lin, Jingqiang ;
Li, Fengjun ;
Luo, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :1802-1831
[7]   A Framework of Cyber-Security Protection for Warship Systems [J].
Lv Yunfei ;
Chen Yuanbao ;
Wang Xuan ;
Li Xuan ;
Zhang Qi .
PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015, 2015, :17-20
[8]  
Maheshwari P., 2016, International Journal of Computer Applications, P7
[9]  
Pavlenko E.Yu., 2018, 2018 IEEE IND CYBER
[10]   Combining De Bruijn Graphs, Overlap Graphs and Microassembly for De Novo Genome Assembly [J].
Sergushichev, A. A. ;
Alexandrov, A. V. ;
Kazakov, S. V. ;
Tsarev, F. N. ;
Shalyto, A. A. .
IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2013, 13 (02) :10-10