The model includes Reconnaissance attacks, Man-In-The-Middle attacks, Denial of Service
attacks, and Replay attacks. We develop a formal risk assessment model that integrates
attack time, detection time, and plant hazard generation time. The attack tree model is used
to implement a set of attacks on a CPS testbed. The experimental results are used to identify
a set of features for attack detection as well as countermeasures. Several important insights …