+

Eckhart et al., 2018 - Google Patents

Towards security-aware virtual environments for digital twins

Eckhart et al., 2018

View PDF
Document ID
16743298792620251836
Author
Eckhart M
Ekelhart A
Publication year
Publication venue
Proceedings of the 4th ACM workshop on cyber-physical system security

External Links

Snippet

Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully functional, virtual replica of a CPS can also play an important role in securing the system. In …
Continue reading at publications.sba-research.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/05Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B17/00Systems involving the use of models or simulators of said systems
    • G05B17/02Systems involving the use of models or simulators of said systems electric
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements

Similar Documents

Publication Publication Date Title
Eckhart et al. Towards security-aware virtual environments for digital twins
Conti et al. A survey on industrial control system testbeds and datasets for security research
Eckhart et al. Digital twins for cyber-physical systems security: State of the art and outlook
Bitton et al. Deriving a cost-effective digital twin of an ICS to facilitate security evaluation
Dietz et al. Unleashing the digital twin's potential for ics security
Krotofil et al. Industrial control systems security: What is happening?
Candell et al. An industrial control system cybersecurity performance testbed
Fauri et al. From system specification to anomaly detection (and back)
Maynard et al. An open framework for deploying experimental scada testbed networks
Liu et al. ShadowPLCs: A novel scheme for remote detection of industrial process control attacks
Puys et al. Hardware-in-the-loop labs for SCADA cybersecurity awareness and training
Patel et al. Real-time, simulation-based identification of cyber-security attacks of industrial plants
Khan et al. Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios.
Lucchese et al. Towards a high-interaction physics-aware honeynet for industrial control systems
US20250141908A1 (en) Battle twin for enhanced ot security
Ekisa et al. Vicsort-a virtualised ics open-source research testbed
Myers Detecting cyber attacks on industrial control systems using process mining
Schuba et al. An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants
Al Ghazo A framework for cybersecurity of supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS)
Toublanc et al. Using a virtual plant to support the development of intelligent gateway for sensors/actuators security
Chen et al. A full-scope, high-fidelity simulator-based hardware-in-the-loop testbed for comprehensive nuclear power plant cybersecurity research
Almalawi et al. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention
Warner Automatic configuration of programmable logic controller emulators
Awad Automated volatile memory forensics for programmable logic controllers
US12309188B1 (en) Cybersecurity algorithms and tools for supervisory control and data acquisition and industrial control systems
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载