Automatic Control and Computer Sciences

, Volume 53, Issue 5, pp 387–392 | Cite as

Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time

  • D. S. LavrovaEmail author
  • E. A. Zaitseva
  • D. P. Zegzhda


This article proposes an approach to presenting the network infrastructure of cyberphysical systems to provide a more rapid identification of a suitable variant to rearranging the route on a graph that characterizes the target function. The proposed approach minimizes the number of used devices and allows neutralizing earlier detected cyberattacks against the system.


cyberphysical system neutralization of cyberattacks graph model de Bruijn graph overlay graph target function 



This study was carried out as part of the Russian Presidential grant for support of leading scientific schools, agreement no. 075-15-2019-1066.


The author declares that he has no conflict of interest.


  1. 1.
    Maheshwari, P., Security issues of cyber physical system: A review, Int. J. Comput. Appl., 2016, no. 1, pp. 7–11.Google Scholar
  2. 2.
    Humayed, A., et al., Cyber-physical systems security—a survey, IEEE Internet of Things J., 2017, vol. 4, no. 6, pp. 1802–1831.CrossRefGoogle Scholar
  3. 3.
    Pavlenko, E.Yu. and Zegzhda, D.P., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems(ICPS), 2018, pp. 830–834.Google Scholar
  4. 4.
    Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.CrossRefGoogle Scholar
  5. 5.
    Sheluhin, O.I. and Lukin, I.Y., Network traffic anomalies detection using a fixing method of multifractal dimension jumps in a real-time mode, Autom. Control Comput. Sci., 2018, vol. 52, no. 5, pp. 421–430.CrossRefGoogle Scholar
  6. 6.
    Narang, P. and Sikdar, B., Anomaly detection in diurnal CPS monitoring data using a local density approach, 2016 IEEE 24th International Conference on Network Protocols (ICNP), 2016, pp. 1–5.Google Scholar
  7. 7.
    Yunfei, L., et al., A framework of cyber-security protection for warship systems, Intelligent Systems Design and Engineering Applications (ISDEA),2015Sixth International Conference on, IEEE, 2015, pp. 17–20.Google Scholar
  8. 8.
    Huang, S., et al., A general real-time control approach of intrusion response for industrial automation systems, IEEE Trans. Syst. Man Cybern.: Syst., 2016, vol. 46, no. 8, pp. 1021–1035.CrossRefGoogle Scholar
  9. 9.
    Dolatdar, E., Soleymani, S., and Mozafari, B., A new distribution network reconfiguration approach using a tree model, World Acad. Sci. Eng. Technol., 2009, vol. 58, no. 34, p. 1186.Google Scholar
  10. 10.
    Horré, W., Lee, K., Hughes, D., Michiels, S., and Joosen, W., A graph based approach to supporting reconfiguration in wireless sensor networks, 2009 First International Conference on Networks & Communications, IEEE, 2009, pp. 326–331.Google Scholar
  11. 11.
    Hong, H., Hu, Z., Guo, R., Ma, J., and Tian, J., Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation, J. Mod. Power Syst. Clean Energy, 2016, vol. 5, no. 1, pp. p. 142.CrossRefGoogle Scholar
  12. 12.
    Sergushichev, A.A., Aleksandrov, A.V., Kazakov, S.V., Tsarev, F.N., and Shalyto, A.A., Combined use of De Bruijn graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat., Mekh., Inf., 2013, vol. 13, no. 2-2.Google Scholar

Copyright information

© Allerton Press, Inc. 2019

Authors and Affiliations

  • D. S. Lavrova
    • 1
    Email author
  • E. A. Zaitseva
    • 1
  • D. P. Zegzhda
    • 1
  1. 1.Department of Information Security in Computer Systems, Institute of Applied Mathematics and Mechanics, Peter the Great Saint-Petersburg Polytechnic UniversitySaint-PetersburgRussia

Personalised recommendations