2017
DOI: 10.1007/978-3-319-71368-7_8
|View full text |Cite
|
Sign up to set email alerts
|

A Dataset to Support Research in the Design of Secure Water Treatment Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
277
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 357 publications
(278 citation statements)
references
References 3 publications
0
277
0
1
Order By: Relevance
“…Attack 35 According to [6], attack 35 occurred at process 1, but herein, the attack was detected at process 3. Before the attack, P-101 was open, and P-202 was close.…”
Section: Attack 19mentioning
confidence: 98%
“…Attack 35 According to [6], attack 35 occurred at process 1, but herein, the attack was detected at process 3. Before the attack, P-101 was open, and P-202 was close.…”
Section: Attack 19mentioning
confidence: 98%
“…For SWaT and WADI, time series datasets are already available online [29], and were obtained by running the testbeds non-stop for seven (resp. 14) days without any interruption from attacks or faults.…”
Section: A Step One: Learning a Prediction Modelmentioning
confidence: 99%
“…We found that smart fuzzing could automatically identify suites of attacks that drove these CPSs into 27 different unsafe states involving water flow, pressure, tank levels, and consumer supply. Furthermore, it covered six unsafe states beyond those in an established expert-crafted benchmark [29]. Finally, we evaluated the utility of smart fuzzing for testing attack defence mechanisms by launching it with SWaT's invariant-based monitoring system enabled [24], [34].…”
Section: Introductionmentioning
confidence: 99%
“…The process has been monitored for a total of eleven days, where seven days were ran as normal operation, while the four last days contained attacks. The data set used in this work is provided by iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design and is titled Secure Water Treatment (SWaT ) [21,26]. It consists of pcap-files containing the packets of the OT network traffic as well as csv-lists containing the sensor and actuator values at each time point.…”
Section: Data Setmentioning
confidence: 99%