Skip to main content

Table 1 Synthesis of the related attacks

From: A controller design for mitigation of passive system identification attacks in networked control systems

Attack

Method

Knowledge about the system?

How the knowledge is obtained?

Stuxnet worm [16]

Modifications in the

Yes

Experiments in a real system

Long, et al. [18]

Jitter and packet loss

None

N/A

Farooqui, et al. [4]

Data injection

None

N/A

Smith [11, 21]

Data injection

Yes

Not described

Teixeira [20]

Packet loss

None

N/A

 

Data injection

Yes

Not described

Amin [6]

Data injection

Yes

Not described

SD-Controlled [12]

Data injection

Yes

Passive system identification attack

de Sá, et al. [17]

Data injection a

Yes

Active system identification attack

  1. aIn [17], the data injection is not used to cause the disruption or degradation of the plant. The data is injected in the NCS to support the Active System Identification attack