Skip to main content
Log in

Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This article proposes an approach to presenting the network infrastructure of cyberphysical systems to provide a more rapid identification of a suitable variant to rearranging the route on a graph that characterizes the target function. The proposed approach minimizes the number of used devices and allows neutralizing earlier detected cyberattacks against the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.

Similar content being viewed by others

REFERENCES

  1. Maheshwari, P., Security issues of cyber physical system: A review, Int. J. Comput. Appl., 2016, no. 1, pp. 7–11.

  2. Humayed, A., et al., Cyber-physical systems security—a survey, IEEE Internet of Things J., 2017, vol. 4, no. 6, pp. 1802–1831.

    Article  Google Scholar 

  3. Pavlenko, E.Yu. and Zegzhda, D.P., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems(ICPS), 2018, pp. 830–834.

    Google Scholar 

  4. Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.

    Article  Google Scholar 

  5. Sheluhin, O.I. and Lukin, I.Y., Network traffic anomalies detection using a fixing method of multifractal dimension jumps in a real-time mode, Autom. Control Comput. Sci., 2018, vol. 52, no. 5, pp. 421–430.

    Article  Google Scholar 

  6. Narang, P. and Sikdar, B., Anomaly detection in diurnal CPS monitoring data using a local density approach, 2016 IEEE 24th International Conference on Network Protocols (ICNP), 2016, pp. 1–5.

  7. Yunfei, L., et al., A framework of cyber-security protection for warship systems, Intelligent Systems Design and Engineering Applications (ISDEA),2015Sixth International Conference on, IEEE, 2015, pp. 17–20.

  8. Huang, S., et al., A general real-time control approach of intrusion response for industrial automation systems, IEEE Trans. Syst. Man Cybern.: Syst., 2016, vol. 46, no. 8, pp. 1021–1035.

    Article  Google Scholar 

  9. Dolatdar, E., Soleymani, S., and Mozafari, B., A new distribution network reconfiguration approach using a tree model, World Acad. Sci. Eng. Technol., 2009, vol. 58, no. 34, p. 1186.

    Google Scholar 

  10. Horré, W., Lee, K., Hughes, D., Michiels, S., and Joosen, W., A graph based approach to supporting reconfiguration in wireless sensor networks, 2009 First International Conference on Networks & Communications, IEEE, 2009, pp. 326–331.

  11. Hong, H., Hu, Z., Guo, R., Ma, J., and Tian, J., Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation, J. Mod. Power Syst. Clean Energy, 2016, vol. 5, no. 1, pp. p. 142.

    Article  Google Scholar 

  12. Sergushichev, A.A., Aleksandrov, A.V., Kazakov, S.V., Tsarev, F.N., and Shalyto, A.A., Combined use of De Bruijn graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat., Mekh., Inf., 2013, vol. 13, no. 2-2.

Download references

Funding

This study was carried out as part of the Russian Presidential grant for support of leading scientific schools, agreement no. 075-15-2019-1066.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. S. Lavrova.

Ethics declarations

The author declares that he has no conflict of interest.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavrova, D.S., Zaitseva, E.A. & Zegzhda, D.P. Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time. Aut. Control Comp. Sci. 53, 387–392 (2019). https://doi.org/10.3103/S0146411619050067

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619050067

Keywords:

Navigation