2018
DOI: 10.1007/978-3-030-05849-4_12
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of ICS Datasets for Security Research Based on Attack Paths

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…List of detected attacks and comparison with [18]. Red (4,14,29) represents attacks that are impossible to detect. Yellow (24) represents attacks that are difficult to detect.…”
Section: Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…List of detected attacks and comparison with [18]. Red (4,14,29) represents attacks that are impossible to detect. Yellow (24) represents attacks that are difficult to detect.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…False positives in process 2 The developed model for process 2 created eight false positives. In Table 6, pairs (1, 2), (4,5), and (6, 7) have the same related attacks. Therefore, there were five independent false positives, and four of them were true.…”
Section: Analysis On False Positives (False Alarms)mentioning
confidence: 99%
“…The data recorded from the SIMULINK model of the APS imitates device logs recorded in a real ICS. The sampling rate for recording the dataset was set to be 1 sample/sec, a common criterion used in most of the publicly available datasets [21]. The physical system consists of sensors and actuators as shown in Fig.…”
Section: B Datasetmentioning
confidence: 99%
“…Therefore, there is the need for new datasets with traffic taken from Operational Technology (OT) networks where hardware and software are used to monitor and control physical processes, devices and infrastructure [23]. Moreover, in addition to the network traffic, data taken from Programmable Logic Controllers (PLC) are necessary in order to inquire the effects of cyber and physical attacks against the physical plant [24].…”
Section: Introductionmentioning
confidence: 99%