Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Wright State University

2014

Computer Science

Articles 1 - 1 of 1

Full-Text Articles in Computer Engineering

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold Jan 2014

Combating Integrity Attacks In Industrial Control Systems, Chad Arnold

Browse all Theses and Dissertations

Industrial Control Systems are vulnerable to integrity attacks because of connectivity to the external Internet and trusted internal networking components that can become compromised. Integrity attacks can be modeled, analyzed, and sometimes remedied by exploiting properties of physical devices and reasoning about the trust worthiness of ICS communication components.

Industrial control systems (ICS) monitor and control the processes of public utility that society depends on - the electric power grid, oil and gas pipelines, transportation, and water facilities. Attacks that impact the operations of these critical assets could have devastating consequences. The complexity and desire to interconnect ICS components have …