Application of failure detection methods to detect information attacks on the control system
The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similaritie...
Gespeichert in:
| Veröffentlicht in: | Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki Jg. 22; H. 3; S. 480 - 491 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
ITMO University
01.12.2024
|
| Schlagworte: | |
| ISSN: | 2226-1494, 2500-0373 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similarities between the consequences of attacks on complex technical systems and failures of these systems. In the course of the work, a hypothesis about the similarity of the impact of failures and information attacks on a complex technical system is presented. Both information attacks and failures cause anomalous dynamics of the control object. Analysis of the deviation of the dynamics of the control object from the normal mode of operation will allow us to detect and isolate information attacks and failures. The paper examines the influence of information attacks on the dynamics of automatic control systems. Comparison of abnormal dynamics of control objects during attacks and device failures is carried out. The similarity of the consequences of information attacks and failures of the control system are analyzed, a method for identifying attacks based on the methods developed for detecting failures is developed. Computer modeling of the influence of information attacks and failures on the control system of a DC motor has been carried out. The simulation results allow making a conclusion about the applicability of the failure detection algorithms for detecting attacks. It is shown that failures and information attacks can lead to dangerous consequences for the control system. It seems relevant to study the intersection of the field of information security and failure detection. |
|---|---|
| AbstractList | The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similarities between the consequences of attacks on complex technical systems and failures of these systems. In the course of the work, a hypothesis about the similarity of the impact of failures and information attacks on a complex technical system is presented. Both information attacks and failures cause anomalous dynamics of the control object. Analysis of the deviation of the dynamics of the control object from the normal mode of operation will allow us to detect and isolate information attacks and failures. The paper examines the influence of information attacks on the dynamics of automatic control systems. Comparison of abnormal dynamics of control objects during attacks and device failures is carried out. The similarity of the consequences of information attacks and failures of the control system are analyzed, a method for identifying attacks based on the methods developed for detecting failures is developed. Computer modeling of the influence of information attacks and failures on the control system of a DC motor has been carried out. The simulation results allow making a conclusion about the applicability of the failure detection algorithms for detecting attacks. It is shown that failures and information attacks can lead to dangerous consequences for the control system. It seems relevant to study the intersection of the field of information security and failure detection. |
| Author | Margun, A.A. Iureva, R.A. Kolesnikova, D.V. |
| Author_xml | – sequence: 1 givenname: A.A. orcidid: 0000-0002-5333-0594 surname: Margun fullname: Margun, A.A. – sequence: 2 givenname: R.A. orcidid: 0000-0002-8006-0980 surname: Iureva fullname: Iureva, R.A. – sequence: 3 givenname: D.V. orcidid: 0000-0003-0942-3926 surname: Kolesnikova fullname: Kolesnikova, D.V. |
| BookMark | eNo9kE1LAzEQhoMoWGv_Qw5eo_nqZgNeSvGjUPCiNyFksxO7dXdTknjovzf9UBhm3nmZeQ_PDbocwwgI3TF6z9S8rh445xVhUkvCKeeklCCypkRqdoEmfE4poUKJy6L_Lq_RLKUtpZSp0jifoM_Fbtd3zuYujDh47G3X_0TALWRwR3OAvAltwjmcTdyNPsTh9GJztu474SLzBrALY46hx2mfMgy36MrbPsHsPKfo4_npfflK1m8vq-ViTRyXghFPK5ASuBIA1EOlJDjNvGAKtOaNrjR44aWTgjpnFdReacVE06i5U7wVYopWp9w22K3ZxW6wcW-C7czRCPHL2Jg714MRSvlKNTVz4CW3olHSe86YZhYqqnTJejxluRhSiuD_8xg1R_DmgNMccJoD-LIaYQp4U8CLX8LReYQ |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.17586/2226-1494-2022-22-3-480-491 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2500-0373 |
| EndPage | 491 |
| ExternalDocumentID | oai_doaj_org_article_377f67b81cef42a3b74ff21191ae6079 10_17586_2226_1494_2022_22_3_480_491 |
| GroupedDBID | 642 AAYXX ADBBV AFKRA ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BPHCQ BYOGL CITATION GROUPED_DOAJ KQ8 PIMPY PQQKQ PROAC VCL VIT |
| ID | FETCH-LOGICAL-c2431-f06e44e273ee0fe674ec91f317e992b969ef3f4c430cca7e8f79713bb75c72d33 |
| IEDL.DBID | DOA |
| ISSN | 2226-1494 |
| IngestDate | Mon Nov 03 22:07:14 EST 2025 Sat Nov 29 03:57:44 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2431-f06e44e273ee0fe674ec91f317e992b969ef3f4c430cca7e8f79713bb75c72d33 |
| ORCID | 0000-0003-0942-3926 0000-0002-8006-0980 0000-0002-5333-0594 |
| OpenAccessLink | https://doaj.org/article/377f67b81cef42a3b74ff21191ae6079 |
| PageCount | 12 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_377f67b81cef42a3b74ff21191ae6079 crossref_primary_10_17586_2226_1494_2022_22_3_480_491 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-12-01 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: 2024-12-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki |
| PublicationYear | 2024 |
| Publisher | ITMO University |
| Publisher_xml | – name: ITMO University |
| SSID | ssj0001700022 ssib026971427 |
| Score | 2.27547 |
| Snippet | The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on... |
| SourceID | doaj crossref |
| SourceType | Open Website Index Database |
| StartPage | 480 |
| SubjectTerms | детектирование отказов изоляция отказов кибератака надежность опасный отказ отказоустойчивость функциональная безопасность |
| Title | Application of failure detection methods to detect information attacks on the control system |
| URI | https://doaj.org/article/377f67b81cef42a3b74ff21191ae6079 |
| Volume | 22 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2500-0373 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001700022 issn: 2226-1494 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8QwEA2yiOhB_MT1ixy8hm2TtEmOq7h4Wjwo7EEITTqB9dCV3ervd9JUrScv3topDcPrtPOGTt4QcpNryHlwFau1qxnmW8000gZWlE7X3nDlnOyGTaj5XC8W5nEw6iv2hCV54ATcRCgVSuV07iFIXgmnZAidLFkFZaa6rXvIegbFFEYSL43KZa9v-ZpEYmK2ipPmkG8wLAvkDjqKXwzky-Xk24hBg8VZbHBnUmdMmvxXvhrI-nf5Z3ZA9nviSKfJ4UOyBc0R2RvICR6Tl-nP32i6CjRUy9h0Tmtou4arhqZ50Rvarnoj7YVTu6tV28Yd9xQPkRbSvoudJrHnE_I8u3-6e2D99ATmObICFrISpASkJwBZgFJJ8CYPyBfAGO5MaSCIIL0UGT5FBTooBE04pwqveC3EKRk1qwbOCK14EStB47kJUoHTJgcvDb5guGQlsjEpvjCyb0kkw8biImJrI7Y2YmsjtnhqhUVsLWI7JrcR0O97otR1Z8AAsH0A2L8C4Pw_Frkgu-idTH0ql2TUrt_himz7j3a5WV93sfUJu9rMSQ |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Application+of+failure+detection+methods+to+detect+information+attacks+on+the+control+system&rft.jtitle=Nauchno-tekhnicheski%C4%AD+vestnik+informat%CD%A1s%EF%B8%A1ionnykh+tekhnologi%C4%AD%2C+mekhaniki+i+optiki&rft.au=Margun%2C+A.A.&rft.au=Iureva%2C+R.A.&rft.au=Kolesnikova%2C+D.V.&rft.date=2024-12-01&rft.issn=2226-1494&rft.volume=22&rft.issue=3&rft.spage=480&rft.epage=491&rft_id=info:doi/10.17586%2F2226-1494-2022-22-3-480-491&rft.externalDBID=n%2Fa&rft.externalDocID=10_17586_2226_1494_2022_22_3_480_491 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2226-1494&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2226-1494&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2226-1494&client=summon |