Application of failure detection methods to detect information attacks on the control system

The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similaritie...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki Jg. 22; H. 3; S. 480 - 491
Hauptverfasser: Margun, A.A., Iureva, R.A., Kolesnikova, D.V.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: ITMO University 01.12.2024
Schlagworte:
ISSN:2226-1494, 2500-0373
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similarities between the consequences of attacks on complex technical systems and failures of these systems. In the course of the work, a hypothesis about the similarity of the impact of failures and information attacks on a complex technical system is presented. Both information attacks and failures cause anomalous dynamics of the control object. Analysis of the deviation of the dynamics of the control object from the normal mode of operation will allow us to detect and isolate information attacks and failures. The paper examines the influence of information attacks on the dynamics of automatic control systems. Comparison of abnormal dynamics of control objects during attacks and device failures is carried out. The similarity of the consequences of information attacks and failures of the control system are analyzed, a method for identifying attacks based on the methods developed for detecting failures is developed. Computer modeling of the influence of information attacks and failures on the control system of a DC motor has been carried out. The simulation results allow making a conclusion about the applicability of the failure detection algorithms for detecting attacks. It is shown that failures and information attacks can lead to dangerous consequences for the control system. It seems relevant to study the intersection of the field of information security and failure detection.
AbstractList The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on control objects and the environment, etc. Prevention of critical failures is important. The purpose of this study is to analyze the similarities between the consequences of attacks on complex technical systems and failures of these systems. In the course of the work, a hypothesis about the similarity of the impact of failures and information attacks on a complex technical system is presented. Both information attacks and failures cause anomalous dynamics of the control object. Analysis of the deviation of the dynamics of the control object from the normal mode of operation will allow us to detect and isolate information attacks and failures. The paper examines the influence of information attacks on the dynamics of automatic control systems. Comparison of abnormal dynamics of control objects during attacks and device failures is carried out. The similarity of the consequences of information attacks and failures of the control system are analyzed, a method for identifying attacks based on the methods developed for detecting failures is developed. Computer modeling of the influence of information attacks and failures on the control system of a DC motor has been carried out. The simulation results allow making a conclusion about the applicability of the failure detection algorithms for detecting attacks. It is shown that failures and information attacks can lead to dangerous consequences for the control system. It seems relevant to study the intersection of the field of information security and failure detection.
Author Margun, A.A.
Iureva, R.A.
Kolesnikova, D.V.
Author_xml – sequence: 1
  givenname: A.A.
  orcidid: 0000-0002-5333-0594
  surname: Margun
  fullname: Margun, A.A.
– sequence: 2
  givenname: R.A.
  orcidid: 0000-0002-8006-0980
  surname: Iureva
  fullname: Iureva, R.A.
– sequence: 3
  givenname: D.V.
  orcidid: 0000-0003-0942-3926
  surname: Kolesnikova
  fullname: Kolesnikova, D.V.
BookMark eNo9kE1LAzEQhoMoWGv_Qw5eo_nqZgNeSvGjUPCiNyFksxO7dXdTknjovzf9UBhm3nmZeQ_PDbocwwgI3TF6z9S8rh445xVhUkvCKeeklCCypkRqdoEmfE4poUKJy6L_Lq_RLKUtpZSp0jifoM_Fbtd3zuYujDh47G3X_0TALWRwR3OAvAltwjmcTdyNPsTh9GJztu474SLzBrALY46hx2mfMgy36MrbPsHsPKfo4_npfflK1m8vq-ViTRyXghFPK5ASuBIA1EOlJDjNvGAKtOaNrjR44aWTgjpnFdReacVE06i5U7wVYopWp9w22K3ZxW6wcW-C7czRCPHL2Jg714MRSvlKNTVz4CW3olHSe86YZhYqqnTJejxluRhSiuD_8xg1R_DmgNMccJoD-LIaYQp4U8CLX8LReYQ
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.17586/2226-1494-2022-22-3-480-491
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2500-0373
EndPage 491
ExternalDocumentID oai_doaj_org_article_377f67b81cef42a3b74ff21191ae6079
10_17586_2226_1494_2022_22_3_480_491
GroupedDBID 642
AAYXX
ADBBV
AFKRA
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BPHCQ
BYOGL
CITATION
GROUPED_DOAJ
KQ8
PIMPY
PQQKQ
PROAC
VCL
VIT
ID FETCH-LOGICAL-c2431-f06e44e273ee0fe674ec91f317e992b969ef3f4c430cca7e8f79713bb75c72d33
IEDL.DBID DOA
ISSN 2226-1494
IngestDate Mon Nov 03 22:07:14 EST 2025
Sat Nov 29 03:57:44 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2431-f06e44e273ee0fe674ec91f317e992b969ef3f4c430cca7e8f79713bb75c72d33
ORCID 0000-0003-0942-3926
0000-0002-8006-0980
0000-0002-5333-0594
OpenAccessLink https://doaj.org/article/377f67b81cef42a3b74ff21191ae6079
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_377f67b81cef42a3b74ff21191ae6079
crossref_primary_10_17586_2226_1494_2022_22_3_480_491
PublicationCentury 2000
PublicationDate 2024-12-01
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: 2024-12-01
  day: 01
PublicationDecade 2020
PublicationTitle Nauchno-tekhnicheskiĭ vestnik informat͡s︡ionnykh tekhnologiĭ, mekhaniki i optiki
PublicationYear 2024
Publisher ITMO University
Publisher_xml – name: ITMO University
SSID ssj0001700022
ssib026971427
Score 2.27547
Snippet The problem of ensuring the security of control systems is an important and urgent problem. It consists of eliminating the impact of failures and attacks on...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 480
SubjectTerms детектирование отказов
изоляция отказов
кибератака
надежность
опасный отказ
отказоустойчивость
функциональная безопасность
Title Application of failure detection methods to detect information attacks on the control system
URI https://doaj.org/article/377f67b81cef42a3b74ff21191ae6079
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2500-0373
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001700022
  issn: 2226-1494
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8QwEA2yiOhB_MT1ixy8hm2TtEmOq7h4Wjwo7EEITTqB9dCV3ervd9JUrScv3topDcPrtPOGTt4QcpNryHlwFau1qxnmW8000gZWlE7X3nDlnOyGTaj5XC8W5nEw6iv2hCV54ATcRCgVSuV07iFIXgmnZAidLFkFZaa6rXvIegbFFEYSL43KZa9v-ZpEYmK2ipPmkG8wLAvkDjqKXwzky-Xk24hBg8VZbHBnUmdMmvxXvhrI-nf5Z3ZA9nviSKfJ4UOyBc0R2RvICR6Tl-nP32i6CjRUy9h0Tmtou4arhqZ50Rvarnoj7YVTu6tV28Yd9xQPkRbSvoudJrHnE_I8u3-6e2D99ATmObICFrISpASkJwBZgFJJ8CYPyBfAGO5MaSCIIL0UGT5FBTooBE04pwqveC3EKRk1qwbOCK14EStB47kJUoHTJgcvDb5guGQlsjEpvjCyb0kkw8biImJrI7Y2YmsjtnhqhUVsLWI7JrcR0O97otR1Z8AAsH0A2L8C4Pw_Frkgu-idTH0ql2TUrt_himz7j3a5WV93sfUJu9rMSQ
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Application+of+failure+detection+methods+to+detect+information+attacks+on+the+control+system&rft.jtitle=Nauchno-tekhnicheski%C4%AD+vestnik+informat%CD%A1s%EF%B8%A1ionnykh+tekhnologi%C4%AD%2C+mekhaniki+i+optiki&rft.au=Margun%2C+A.A.&rft.au=Iureva%2C+R.A.&rft.au=Kolesnikova%2C+D.V.&rft.date=2024-12-01&rft.issn=2226-1494&rft.volume=22&rft.issue=3&rft.spage=480&rft.epage=491&rft_id=info:doi/10.17586%2F2226-1494-2022-22-3-480-491&rft.externalDBID=n%2Fa&rft.externalDocID=10_17586_2226_1494_2022_22_3_480_491
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2226-1494&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2226-1494&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2226-1494&client=summon