HIGH FIDELITY VIRTUALIZATION OF CYBER-PHYSICAL SYSTEMS, International Journal of Modeling, Simulation, and Scientific Computing, vol.04, issue.02, p.2013 ,
DOI : 10.1109/5.97300
NITRD Cyber-Physical Security Panel, 35th IEEE Symposium on Security and Privacy ,
Secure Control: Towards Survivable Cyber-Physical Systems, 2008 The 28th International Conference on Distributed Computing Systems Workshops, pp.495-500, 2008. ,
DOI : 10.1109/ICDCS.Workshops.2008.40
URL : http://www.vs.inf.ethz.ch/edu/HS2011/CPS/papers/cardenas08_secure-control.pdf
Challenges for securing cyber physical systems, Workshop on Future Directions in Cyber-Physical Systems Security, p.7, 2009. ,
Functional safety of electrical/electronic/programmable electronic safety related systems, Computing & Control Engineering Journal, vol.11, issue.11, p.14, 2000. ,
How US utilities passed up chance to protect their networks Cybersecurity-How-US-utilities-passed-up-chance-to-protect-their-networks, 2012. ,
Exploring Network Security in PROFIsafe, Computer Safety, Reliability, and Security: 28th International Conference. Proceedings, pp.67-80, 2009. ,
DOI : 10.3182/20080706-5-KR-1001.02364
Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs, IEEE Control Systems, vol.35, issue.1, pp.93-109, 2015. ,
DOI : 10.1109/MCS.2014.2364724
Physical Attestation in the Smart Grid for Distributed State Verification, IEEE Transactions on Dependable and Secure Computing, issue.99, p.2016 ,
DOI : 10.1109/compsac.2017.188
Lightweight privacy for smart metering data by adding noise, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.531-538, 2014. ,
DOI : 10.1145/2554850.2554982
Detection and Protection Against Intrusions on Smart Grid Systems, International Journal of Cyber-Security and Digital Forensics, vol.3, issue.1, pp.38-48, 2014. ,
DOI : 10.17781/P001273
A statistical method for detecting cyber/physical attacks on SCADA systems, 2014 IEEE Conference on Control Applications (CCA), pp.364-369, 2014. ,
A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures, International Journal of Critical Infrastructure Protection, vol.10, pp.3-17, 2015. ,
DOI : 10.1016/j.ijcip.2015.04.001
Cyber-Physical Security of a Smart Grid Infrastructure, Proceedings of the IEEE, pp.195-209, 2012. ,
Secure Detection in Cyberphysical Control Systems, 2014. ,
Secure control systems: A control-theoretic approach to cyber-physical security, 2012. ,
A hierarchical security architecture for smart grid, pp.413-438, 2012. ,
DOI : 10.1017/CBO9781139013468.019
Cryptographic Protection of SCADA Communications, 2006. ,
Low-Latency Cryptographic Protection for SCADA Communications, pp.263-277, 2004. ,
DOI : 10.1007/978-3-540-24852-1_19
URL : http://scadasafe.sourceforge.net/security.pdf
http://www.profibus.com/download/specifications-standards/, Last access, Last access: Octobre 2014. [23] Frances Cleveland. IEC 62351 Security Standards for the Power System Information Infrastructure, 2013. ,
The World Market for Industrial Ethernet -2009 Edition, 2009. ,
Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, p.2011 ,
Safety networking for today and beyond, Library, 2017. ,
CIP Security Phase 1: Secure Transport for EtherNet/IP, ODVA 2015 Industry Conference & 17th Annual Meeting, p.15, 2015. ,
Communication Profile Specification (EPSG DS 301 V1.2.0), 2013. ,
Security Issues and Mitigation in Ethernet POWERLINK, 2nd Workshop On The Security Of Industrial Control System & Cyber-Physical Systems, 2016. ,
DOI : 10.1109/INDIN.2013.6622965
URL : https://hal.archives-ouvertes.fr/hal-01560206
Attacks against process control systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.355-366, 2011. ,
DOI : 10.1145/1966913.1966959
Stealth Attacks and Protection Schemes for State Estimators in Power Systems, 2010 First IEEE International Conference on Smart Grid Communications, p.2010 ,
DOI : 10.1109/SMARTGRID.2010.5622046
False Data Injection Attacks Against State Estimation in Electric Power Grids, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pp.21-32, 2009. ,
DOI : 10.1145/1952982.1952995
URL : http://discovery.csc.ncsu.edu/~pning/pubs/ccs09-PowerGrids.pdf
Attack models and scenarios for networked control systems, Proceedings of the 1st international conference on High Confidence Networked Systems, HiCoNS '12, pp.55-64 ,
DOI : 10.1145/2185505.2185515
Detecting integrity attacks on SCADA systems, IEEE Transactions on Control Systems Technology, vol.22, issue.4, pp.1396-1407, 2014. ,
Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure, IEEE Control Systems, vol.35, issue.1, pp.82-92, 2015. ,
Detection of covert attacks and zero dynamics attacks in cyber-physical systems, 2016 American Control Conference (ACC), pp.302-307, 2016. ,
DOI : 10.1109/ACC.2016.7524932
Resilient control of cyber-physical systems against Denial-of-Service attacks, 2013 6th International Symposium on Resilient Control Systems (ISRCS), pp.54-59, 2013. ,
DOI : 10.1109/ISRCS.2013.6623750
A secure control framework for resource-limited adversaries, Automatica, vol.51, pp.135-148, 2015. ,
DOI : 10.1016/j.automatica.2014.10.067
URL : http://arxiv.org/pdf/1212.0226
Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information, IEEE Transactions on Automatic Control, vol.62, issue.9, pp.1-1, 2016. ,
DOI : 10.1109/TAC.2016.2626267
URL : http://arxiv.org/pdf/1503.07125
Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems, IEEE Control Systems, vol.35, issue.1, pp.110-127, 2015. ,
DOI : 10.1109/MCS.2014.2364725
False data injection attacks against state estimation in wireless sensor networks, 49th IEEE Conference on Decision and Control (CDC), pp.5967-5972, 2010. ,
DOI : 10.1109/CDC.2010.5718158
On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems, Journal of Digital Forensics, Security and Law, vol.9, issue.1, p.37, 2014. ,
DOI : 10.15394/jdfsl.2014.1162
URL : https://doi.org/10.15394/jdfsl.2014.1162
Detecting False Data Injection Attacks on DC State Estimation, Proceeding of the 1st Workshop on Secure Control Systems (CPSWEEK), pp.1-9, 2010. ,
False data injection attacks against state estimation in electric power grids, ACM Transactions on Information and System Security, vol.14, issue.1, p.13, 2011. ,
DOI : 10.1145/1952982.1952995
URL : http://discovery.csc.ncsu.edu/~pning/pubs/ccs09-PowerGrids.pdf
A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems, {IFAC} Proceedings Volumes 18th {IFAC} World Congress, pp.90-95, 2011. ,
DOI : 10.3182/20110828-6-IT-1002.01721
On SCADA control system command and response injection and intrusion detection, 2010 eCrime Researchers Summit, pp.1-9, 2010. ,
Industrial control system cyber attacks ,
A Survey of Fault Detection, Isolation, and Reconfiguration Methods, IEEE Transactions on Control Systems Technology, vol.18, issue.3, pp.636-653, 2010. ,
DOI : 10.1109/TCST.2009.2026285
Stuxnet: Dissecting a Cyberwarfare Weapon, IEEE Security & Privacy Magazine, vol.9, issue.3, pp.49-51, 2011. ,
DOI : 10.1109/MSP.2011.67
Secure control against replay attacks, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.911-918, 2009. ,
DOI : 10.1109/ALLERTON.2009.5394956
URL : http://users.ece.cmu.edu/~brunos/Publications/allerton_2009.pdf
Stochastic game approach for replay attack detection, 52nd IEEE Conference on Decision and Control, pp.1854-1859, 2013. ,
Dynamic policy-based IDS configuration, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pp.8600-8605, 2009. ,
DOI : 10.1109/CDC.2009.5399894
Detection of Cyber-Physical Faults and Intrusions from Physical Correlations, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp.303-310, 2016. ,
DOI : 10.1109/ICDMW.2016.0050
URL : http://arxiv.org/pdf/1602.06604
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA, Computer Security -ESORICS 2014: 19th European Symposium on Research in Computer Security Proceedings, Part II, pp.401-418, 2014. ,
DOI : 10.1007/978-3-319-11212-1_23
URL : http://faculty.cs.tamu.edu/guofei/paper/SRID-ESORICS14.pdf
Integrity attack detection in PMU networks using static state estimation algorithm, 2015 IEEE Eindhoven PowerTech, pp.1-6, 2015. ,
DOI : 10.1109/PTC.2015.7232265
Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems, IEEE Transactions on Industrial Electronics, vol.62, issue.6, pp.3832-3842, 2015. ,
DOI : 10.1109/TIE.2014.2350451
URL : http://spiral.imperial.ac.uk/bitstream/10044/1/19130/2/IEEE-TIE.pdf
Game-theoretic methods for security and resilience in cyber-physical systems, 2013. ,
Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems, IEEE Control Systems, vol.35, issue.1, pp.46-65, 2015. ,
DOI : 10.1109/MCS.2014.2364710
Survey and New Directions for Physics-Based Attack Detection in Control Systems, National Institute of Standards and Technology (NIST), pp.1-37, 2016. ,
Perspectives on system identification, Annual Reviews in Control, vol.34, issue.1, pp.1-12, 2010. ,
DOI : 10.1016/j.arcontrol.2009.12.001
URL : http://www.control.isy.liu.se/%7Eljung/seoul2dvinew/plenary2.pdf
Quantifying the error in estimated transfer functions with application to model order selection, IEEE Transactions on Automatic Control, vol.37, issue.7, pp.913-928, 1992. ,
DOI : 10.1109/9.148344
URL : http://murray.newcastle.edu.au/users/staff/brett/ggn.ps.gz
System identification: Theory for the User, 1987. ,
System identification, Automatica, vol.28, issue.5, pp.1069-1071, 1992. ,
DOI : 10.1016/0005-1098(92)90167-E
Model predictive control of a continuous, nonlinear, two-phase reactor, Journal of Process Control, vol.3, issue.2, pp.109-123, 1993. ,
DOI : 10.1016/0959-1524(93)80006-W
Complexity Issues, Validation and Input Design for Control in System Identification, KTH School of Electrical Engineering, 2008. ,
Robust Extended Kalman Filtering via Krein Space Estimation, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, issue.1, pp.87-243, 2004. ,
Stability and Stabilization of Networked Control Systems, pp.203-253, 2010. ,
DOI : 10.1007/978-0-85729-033-5_7
Autotuning of PID Controllers, 2006. ,
LQG vs PID in attitude control of a unmanned aerial vehicle in hover, 10th International Conference on Advanced Robotics (ICAR) 2001, pp.599-604, 2001. ,
Stability of networked control systems, IEEE Control Systems Magazine, vol.21, issue.1, pp.84-99, 2001. ,
DOI : 10.1109/37.898794
Survey of Recent Progress in Networked Control Systems, Acta Automatica Sinica, vol.39, issue.2, pp.101-117, 2013. ,
Sistemas de Control Basados en Red Modelado y Dise??o de Estructuras de Control, Revista Iberoamericana de Autom??tica e Inform??tica Industrial RIAI, vol.5, issue.3, pp.5-20, 2008. ,
DOI : 10.1016/S1697-7912(08)70157-2
Model-based periodic event-triggered control for linear systems, Automatica, vol.49, issue.3, pp.698-711, 2013. ,
DOI : 10.1016/j.automatica.2012.11.025
Periodic Event-Triggered Control for Linear Systems, IEEE Transactions on Automatic Control, vol.58, issue.4, pp.847-861, 2013. ,
DOI : 10.1109/TAC.2012.2220443
Stochastic Event-Triggered Sensor Schedule for Remote State Estimation, IEEE Transactions on Automatic Control, vol.60, issue.10, pp.602661-2675, 2015. ,
DOI : 10.1109/TAC.2015.2406975
URL : http://arxiv.org/pdf/1402.0599
System identification and parameter estimation, 2012. ,
New Developments in Industrial MPC Identification, Proceedings of the International Symposium on Advanced Control of Chemical Processes (ADChEM). Hong Kong, 2003. ,
DOI : 10.1016/S1474-6670(17)38705-0
System Identification, Journal of Dynamic Systems, Measurement, and Control, vol.115, issue.4, 1989. ,
DOI : 10.1115/1.2899207
Multivariable and closed-loop identification for model predictive control, 2000. ,
Using arx approach for modelling and prediction of the dynamics of a reactor-exchanger, In INSTITUTION OF CHEMICAL ENGINEERS SYMPOSIUM SERIES Institution of Chemical Engineers, vol.154, p.297, 1999. ,
Simulation of Network Attacks on SCADA Systems, First Workshop on Secure Control Systems, Cyber Physical Systems Week, 2010. ,
DOI : 10.3182/20110828-6-it-1002.03712
URL : http://users.ece.cmu.edu/~brunos/Publications/ifac11.pdf
Security Considerations in SCADA Communication Protocols, 2004. ,
Secure Water Treatment Testbed (SWaT): An Overview, 2015. ,
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation, IEEE Transactions on Emerging Topics in Computing, vol.1, issue.2, pp.319-330, 2013. ,
DOI : 10.1109/TETC.2013.2287188
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=6646193
Testbed diversity as a fundamental principle for effective ICS security research, Proceedings of the First International Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN). Lancaster University, pp.12-15, 2016. ,
Testbed cross-cutting research, 2014, https://tcipg.org/research/ testbed-cross-cutting-research, Last access, 2016. ,
SCADA Laboratory and Test-bed as a Service for Critical Infrastructure Protection, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014, pp.25-29 ,
DOI : 10.14236/ewic/ics-csr2014.4
Rocking the pocket book: Hacking chemical plants for competition and extortion, DEF CON, vol.23, 2015. ,
HIGH FIDELITY VIRTUALIZATION OF CYBER-PHYSICAL SYSTEMS, International Journal of Modeling, Simulation, and Scientific Computing, vol.04, issue.02, pp.1-26, 2013. ,
DOI : 10.1109/5.97300
QEMU, a Fast and Portable Dynamic Translator, Annual Technical Conference, ATEC'05, pp.41-46, 2005. ,
A cybersecurity testbed for industrial control systems, Process Control and Safety Symposium, International Society of Automation, 2014. ,
DOI : 10.6028/NIST.IR.8089
The Cybersecurity Landscape in Industrial Control Systems, Proceedings of the IEEE, vol.104, issue.5, pp.1039-1057, 2016. ,
DOI : 10.1109/JPROC.2015.2512235
A real-time testbed environment for cyber-physical security on the power grid A Survey of Industrial Control System Testbeds, 1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy Secure IT Systems: 20th Nordic Conference Proceedings, pp.67-78, 2015. ,
Digital control of dynamic systems, 1998. ,
A Chi-square test for fault-detection in Kalman filters, IEEE Transactions on Automatic Control, vol.32, issue.6, pp.552-554, 1987. ,
DOI : 10.1109/TAC.1987.1104658
Step Size Optimization of LMS Algorithm Using Aunt Colony Optimization & Its comparison with Particle Swarm optimization Algorithm in System Identification, International Research Journal of Engineering and Technology (IRJET), vol.2, pp.599-605, 2015. ,
Adaptive filter theory. Pearson Education India, 2014. ,
Stationary and nonstationary learning characteristics of the LMS adaptive filter, Proceedings of the IEEE, pp.1151-1162, 1976. ,
DOI : 10.1007/978-94-010-1223-2_23
Detecting Integrity Attacks on SCADA Systems, IFAC Proceedings Volumes, pp.11239-11244, 2011. ,
DOI : 10.3182/20110828-6-IT-1002.03712
URL : http://users.ece.cmu.edu/~brunos/Publications/ifac11.pdf
Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems, IFAC-PapersOnLine, vol.48, issue.3, pp.579-584, 2015. ,
DOI : 10.1016/j.ifacol.2015.06.143
A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems, Manufacturing Letters, vol.3, pp.18-23, 2015. ,
DOI : 10.1016/j.mfglet.2014.12.001
Cyber-physical systems. The impact of control technology, pp.161-166, 2011. ,
Dynamic Watermarking: Active Defense of Networked Cyber???Physical Systems, Proceedings of the IEEE, pp.219-240, 2017. ,
DOI : 10.1109/JPROC.2016.2575064
URL : https://doi.org/10.1109/jproc.2016.2575064
Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes, Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC '14, pp.126-135, 2014. ,
Limiting the Impact of Stealthy Attacks on Industrial Control Systems, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1092-1105, 2016. ,
DOI : 10.1109/CPRE.2011.6035612
URL : http://dl.acm.org/ft_gateway.cfm?id=2978388&type=pdf
La Cybersécurité des Réseaux Electriques Intelligents. White book. La Revue de l'Electricité et de l, Electronique (REE), 2016. ,
A basic technical overview of the protocol, 2005. ,
Raspberry Pi for Automation of Water Treatment Plant, Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on, pp.532-536, 2015. ,
System Identification Toolbox: User's Guide, 2012. ,
ARP: preventing ARP poisoning-based man-in-the-middle attacks, IEEE communications letters, vol.14, issue.2, pp.187-189, 2010. ,
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol, 2013 Third International Conference on Communications and Information Technology (ICCIT), pp.179-184, 2013. ,
DOI : 10.1109/ICCITechnology.2013.6579545
Kalman qui produit une estimation optimale d'état?xétat? état?x t de l'état x t en fonction des mesures de bruit obtenues ,
LQR) qui fournit la loi de contrôle u t qui résout le problème LQR, en fonction de l'estimation de l'état?xétat? état?x t ,
1. Il est important de noter que la définition donnée ci-dessus suppose que l'attaquant ne possède pas (ou ne tente pas de rassembler) des connaissances du modèle du système. Pour cette raison ,
URL : https://hal.archives-ouvertes.fr/pasteur-01256155
utilisation de stratégies de contrôle pour conserver, par exemple, la performance de la boucle-fermée du système ou les propriétés de sûreté d'un réseau de communication reliant les composants distribués d'un système physique. Cependant ,
adapter les stratégies de contrôle traditionnelles utilisées pour détecter les failles accidentelles et les erreurs, vers la détection d'attaques malveillantes [75, 77, 78]. Motivés par les mêmes objectifs, nous présentons une solution qui complète le détecteur de signature afin de couvrir ces faiblesses. Plus précisément, la nouvelle solution combine les stratégies de contrôle avec la stratégie de défi-réponse analysée et améliorée dans la section précédente ,