Author: Raphael Fritz
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832582754
Category : Technology & Engineering
Languages : en
Pages : 200
Book Description
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
Cyber Security for Discrete Event Systems
Author: Raphael Fritz
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832582754
Category : Technology & Engineering
Languages : en
Pages : 200
Book Description
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
Publisher: Logos Verlag Berlin GmbH
ISBN: 3832582754
Category : Technology & Engineering
Languages : en
Pages : 200
Book Description
Cyber-physical systems are a crucial part of modern automation applications. These systems are widespread across the production industry and critical infrastructures where a high degree of security, reliability and availability is required. This work investigates possible defense mechanisms against attacks on cyber-physical systems modeled by networked discrete event systems. Based on a threat assessment, attack prevention, attack detection and localization, and attack recovery methods are proposed. The cyber attacks under consideration are stealthy attacks that actively hide their influence and are not detectable by conventional anomaly detection schemes. The attack prevention is based on a controller encryption scheme exploiting the use of homomorphic encryption. The attack detection and localization are realized by introducing unexpected behavior into the transmitted signals and analyzing the timing behavior. The attack recovery reconfigures the controller based on the information gained from the attack localization and Monte-Carlo Tree Search.
Cybersecurity of Discrete Event Systems
Author: Rong Su
Publisher: CRC Press
ISBN: 1040031323
Category : Computers
Languages : en
Pages : 283
Book Description
This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
Publisher: CRC Press
ISBN: 1040031323
Category : Computers
Languages : en
Pages : 283
Book Description
This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
Modeling and Simulation of Discrete Event Systems
Author: Byoung Kyu Choi
Publisher: John Wiley & Sons
ISBN: 1118732855
Category : Technology & Engineering
Languages : en
Pages : 427
Book Description
Computer modeling and simulation (M&S) allows engineers to study and analyze complex systems. Discrete-event system (DES)-M&S is used in modern management, industrial engineering, computer science, and the military. As computer speeds and memory capacity increase, so DES-M&S tools become more powerful and more widely used in solving real-life problems. Based on over 20 years of evolution within a classroom environment, as well as on decades-long experience in developing simulation-based solutions for high-tech industries, Modeling and Simulation of Discrete-Event Systems is the only book on DES-M&S in which all the major DES modeling formalisms – activity-based, process-oriented, state-based, and event-based – are covered in a unified manner: A well-defined procedure for building a formal model in the form of event graph, ACD, or state graph Diverse types of modeling templates and examples that can be used as building blocks for a complex, real-life model A systematic, easy-to-follow procedure combined with sample C# codes for developing simulators in various modeling formalisms Simple tutorials as well as sample model files for using popular off-the-shelf simulators such as SIGMA®, ACE®, and Arena® Up-to-date research results as well as research issues and directions in DES-M&S Modeling and Simulation of Discrete-Event Systems is an ideal textbook for undergraduate and graduate students of simulation/industrial engineering and computer science, as well as for simulation practitioners and researchers.
Publisher: John Wiley & Sons
ISBN: 1118732855
Category : Technology & Engineering
Languages : en
Pages : 427
Book Description
Computer modeling and simulation (M&S) allows engineers to study and analyze complex systems. Discrete-event system (DES)-M&S is used in modern management, industrial engineering, computer science, and the military. As computer speeds and memory capacity increase, so DES-M&S tools become more powerful and more widely used in solving real-life problems. Based on over 20 years of evolution within a classroom environment, as well as on decades-long experience in developing simulation-based solutions for high-tech industries, Modeling and Simulation of Discrete-Event Systems is the only book on DES-M&S in which all the major DES modeling formalisms – activity-based, process-oriented, state-based, and event-based – are covered in a unified manner: A well-defined procedure for building a formal model in the form of event graph, ACD, or state graph Diverse types of modeling templates and examples that can be used as building blocks for a complex, real-life model A systematic, easy-to-follow procedure combined with sample C# codes for developing simulators in various modeling formalisms Simple tutorials as well as sample model files for using popular off-the-shelf simulators such as SIGMA®, ACE®, and Arena® Up-to-date research results as well as research issues and directions in DES-M&S Modeling and Simulation of Discrete-Event Systems is an ideal textbook for undergraduate and graduate students of simulation/industrial engineering and computer science, as well as for simulation practitioners and researchers.
Information Security Theory and Practice
Author: Samia Bouzefrane
Publisher: Springer Nature
ISBN: 3031603915
Category :
Languages : en
Pages : 205
Book Description
Publisher: Springer Nature
ISBN: 3031603915
Category :
Languages : en
Pages : 205
Book Description
Supervisory Control of Discrete-Event Systems
Author: W. Murray Wonham
Publisher: Springer
ISBN: 3319774522
Category : Technology & Engineering
Languages : en
Pages : 504
Book Description
This book shows how supervisory control theory (SCT) supports the formulation of various control problems of standard types, like the synthesis of controlled dynamic invariants by state feedback, and the resolution of such problems in terms of naturally definable control-theoretic concepts and properties, like reachability, controllability and observability. It exploits a simple, abstract model of controlled discrete-event systems (DES) that has proved to be tractable, appealing to control specialists, and expressive of a range of control-theoretic ideas. It allows readers to choose between automaton-based and dually language-based forms of SCT, depending on whether their preference is for an internal-structural or external-behavioral description of the problem. The monograph begins with two chapters on algebraic and linguistic preliminaries and the fundamental concepts and results of SCT are introduced. To handle complexity caused by system scale, architectural approaches—the horizontal modularity of decentralized and distributed supervision and the vertical modularity of hierarchical supervision—are introduced. Supervisory control under partial observation and state-based supervisory control are also addressed; in the latter, a vector DES model that exploits internal regularity of algebraic structure is proposed. Finally SCT is generalized to deal with timed DES by incorporating temporal features in addition to logical ones. Researchers and graduate students working with the control of discrete-event systems or who are interested in the development of supervisory control methods will find this book an invaluable aid in their studies. The text will also be of assistance to researchers in manufacturing, logistics, communications and transportation, areas which provide plentiful examples of the class of systems being discussed.
Publisher: Springer
ISBN: 3319774522
Category : Technology & Engineering
Languages : en
Pages : 504
Book Description
This book shows how supervisory control theory (SCT) supports the formulation of various control problems of standard types, like the synthesis of controlled dynamic invariants by state feedback, and the resolution of such problems in terms of naturally definable control-theoretic concepts and properties, like reachability, controllability and observability. It exploits a simple, abstract model of controlled discrete-event systems (DES) that has proved to be tractable, appealing to control specialists, and expressive of a range of control-theoretic ideas. It allows readers to choose between automaton-based and dually language-based forms of SCT, depending on whether their preference is for an internal-structural or external-behavioral description of the problem. The monograph begins with two chapters on algebraic and linguistic preliminaries and the fundamental concepts and results of SCT are introduced. To handle complexity caused by system scale, architectural approaches—the horizontal modularity of decentralized and distributed supervision and the vertical modularity of hierarchical supervision—are introduced. Supervisory control under partial observation and state-based supervisory control are also addressed; in the latter, a vector DES model that exploits internal regularity of algebraic structure is proposed. Finally SCT is generalized to deal with timed DES by incorporating temporal features in addition to logical ones. Researchers and graduate students working with the control of discrete-event systems or who are interested in the development of supervisory control methods will find this book an invaluable aid in their studies. The text will also be of assistance to researchers in manufacturing, logistics, communications and transportation, areas which provide plentiful examples of the class of systems being discussed.
Introduction to Discrete Event Systems
Author: Christos G. Cassandras
Publisher: Springer Science & Business Media
ISBN: 0387333320
Category : Technology & Engineering
Languages : en
Pages : 781
Book Description
Introduction to Discrete Event Systems is a comprehensive introduction to the field of discrete event systems, offering a breadth of coverage that makes the material accessible to readers of varied backgrounds. The book emphasizes a unified modeling framework that transcends specific application areas, linking the following topics in a coherent manner: language and automata theory, supervisory control, Petri net theory, Markov chains and queuing theory, discrete-event simulation, and concurrent estimation techniques. This edition includes recent research results pertaining to the diagnosis of discrete event systems, decentralized supervisory control, and interval-based timed automata and hybrid automata models.
Publisher: Springer Science & Business Media
ISBN: 0387333320
Category : Technology & Engineering
Languages : en
Pages : 781
Book Description
Introduction to Discrete Event Systems is a comprehensive introduction to the field of discrete event systems, offering a breadth of coverage that makes the material accessible to readers of varied backgrounds. The book emphasizes a unified modeling framework that transcends specific application areas, linking the following topics in a coherent manner: language and automata theory, supervisory control, Petri net theory, Markov chains and queuing theory, discrete-event simulation, and concurrent estimation techniques. This edition includes recent research results pertaining to the diagnosis of discrete event systems, decentralized supervisory control, and interval-based timed automata and hybrid automata models.
H-Systems
Author: Elena De Santis
Publisher: Springer Nature
ISBN: 3031204476
Category : Technology & Engineering
Languages : en
Pages : 305
Book Description
This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from sometimes necessarily partial information. By explaining how available measurements can be used to deduce past and future behaviours of a system, the authors extend this study of observability to embrace the properties of diagnosability and predictability. H-systems shows how continuous and discrete dynamics and their interaction affect the observability of this general class of hybrid systems and demonstrates that hybrid characteristics are not simply generalizations of well-known aspects of traditional dynamics. The authors identify conditions for state reconstruction, prediction and diagnosis of the occurrence of possibly faulty states. The formal approach to proving those properties for hybrid systems is accompanied by simple illustrative examples. For readers who are interested in the use of state estimation for controller design, the book also provides design methods for hybrid state observers and covers their application in some industrial cases. The book’s tutorial approach to the various forms of observability of hybrid systems helps to make H-systems of interest to academic researchers and graduate students working in control and to practitioners using control in an industrial environment.
Publisher: Springer Nature
ISBN: 3031204476
Category : Technology & Engineering
Languages : en
Pages : 305
Book Description
This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from sometimes necessarily partial information. By explaining how available measurements can be used to deduce past and future behaviours of a system, the authors extend this study of observability to embrace the properties of diagnosability and predictability. H-systems shows how continuous and discrete dynamics and their interaction affect the observability of this general class of hybrid systems and demonstrates that hybrid characteristics are not simply generalizations of well-known aspects of traditional dynamics. The authors identify conditions for state reconstruction, prediction and diagnosis of the occurrence of possibly faulty states. The formal approach to proving those properties for hybrid systems is accompanied by simple illustrative examples. For readers who are interested in the use of state estimation for controller design, the book also provides design methods for hybrid state observers and covers their application in some industrial cases. The book’s tutorial approach to the various forms of observability of hybrid systems helps to make H-systems of interest to academic researchers and graduate students working in control and to practitioners using control in an industrial environment.
Advances in Computing, Informatics, Networking and Cybersecurity
Author: Petros Nicopolitidis
Publisher: Springer Nature
ISBN: 3030870499
Category : Computers
Languages : en
Pages : 812
Book Description
This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today’s society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
Publisher: Springer Nature
ISBN: 3030870499
Category : Computers
Languages : en
Pages : 812
Book Description
This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today’s society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
Advances in Network Security and Applications
Author: David C. Wyld
Publisher: Springer
ISBN: 3642225403
Category : Computers
Languages : en
Pages : 677
Book Description
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
Publisher: Springer
ISBN: 3642225403
Category : Computers
Languages : en
Pages : 677
Book Description
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
Guide to Cybersecurity in Digital Transformation
Author: Dietmar P.F. Möller
Publisher: Springer Nature
ISBN: 3031268458
Category : Computers
Languages : en
Pages : 432
Book Description
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecurity’s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
Publisher: Springer Nature
ISBN: 3031268458
Category : Computers
Languages : en
Pages : 432
Book Description
In today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks. Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals. Topics and features: Explores cybersecurity’s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networks Provides numerous examples of applications and best practices Considers methods that organizations can use to assess their cybersecurity awareness and/or strategy Describes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate data Addresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacks Discusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity Standard Gathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity. Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.