Abstract—
This article proposes an approach to presenting the network infrastructure of cyberphysical systems to provide a more rapid identification of a suitable variant to rearranging the route on a graph that characterizes the target function. The proposed approach minimizes the number of used devices and allows neutralizing earlier detected cyberattacks against the system.
Similar content being viewed by others
REFERENCES
Maheshwari, P., Security issues of cyber physical system: A review, Int. J. Comput. Appl., 2016, no. 1, pp. 7–11.
Humayed, A., et al., Cyber-physical systems security—a survey, IEEE Internet of Things J., 2017, vol. 4, no. 6, pp. 1802–1831.
Pavlenko, E.Yu. and Zegzhda, D.P., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems(ICPS), 2018, pp. 830–834.
Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.
Sheluhin, O.I. and Lukin, I.Y., Network traffic anomalies detection using a fixing method of multifractal dimension jumps in a real-time mode, Autom. Control Comput. Sci., 2018, vol. 52, no. 5, pp. 421–430.
Narang, P. and Sikdar, B., Anomaly detection in diurnal CPS monitoring data using a local density approach, 2016 IEEE 24th International Conference on Network Protocols (ICNP), 2016, pp. 1–5.
Yunfei, L., et al., A framework of cyber-security protection for warship systems, Intelligent Systems Design and Engineering Applications (ISDEA),2015Sixth International Conference on, IEEE, 2015, pp. 17–20.
Huang, S., et al., A general real-time control approach of intrusion response for industrial automation systems, IEEE Trans. Syst. Man Cybern.: Syst., 2016, vol. 46, no. 8, pp. 1021–1035.
Dolatdar, E., Soleymani, S., and Mozafari, B., A new distribution network reconfiguration approach using a tree model, World Acad. Sci. Eng. Technol., 2009, vol. 58, no. 34, p. 1186.
Horré, W., Lee, K., Hughes, D., Michiels, S., and Joosen, W., A graph based approach to supporting reconfiguration in wireless sensor networks, 2009 First International Conference on Networks & Communications, IEEE, 2009, pp. 326–331.
Hong, H., Hu, Z., Guo, R., Ma, J., and Tian, J., Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation, J. Mod. Power Syst. Clean Energy, 2016, vol. 5, no. 1, pp. p. 142.
Sergushichev, A.A., Aleksandrov, A.V., Kazakov, S.V., Tsarev, F.N., and Shalyto, A.A., Combined use of De Bruijn graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat., Mekh., Inf., 2013, vol. 13, no. 2-2.
Funding
This study was carried out as part of the Russian Presidential grant for support of leading scientific schools, agreement no. 075-15-2019-1066.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The author declares that he has no conflict of interest.
Additional information
Translated by S. Kuznetsov
About this article
Cite this article
Lavrova, D.S., Zaitseva, E.A. & Zegzhda, D.P. Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time. Aut. Control Comp. Sci. 53, 387–392 (2019). https://doi.org/10.3103/S0146411619050067
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619050067