2020
DOI: 10.1016/j.ijcip.2020.100377
|View full text |Cite
|
Sign up to set email alerts
|

A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments

Abstract: Advanced sensing is a key ingredient for intelligent control in Industrial Internet of Things (IIoT) environments. Coupled with enhanced communication capabilities, sensors are becoming increasingly vulnerable to cyberattacks, thereby jeopardizing the often safety-critical underlying cyber-physical system. One prominent approach to sensor-level attack detection in modern industrial environments, named pasad, has recently been proposed in the literature. Pasad is a process-aware stealthy-attack detection mechan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…A process-level IDS is categorised in two categories, the univariate (independent IDS for each sensor variables) [9], [28], [29], [36] and multivariate (an IDS model takes input from the multiple sensor variables) [31], [32], [33], [37], [21], [34], [35], [38]. In [39], the authors developed a PLC rootkit that can corrupt the communication route between sensors and SCADA.…”
Section: Related Workmentioning
confidence: 99%
“…A process-level IDS is categorised in two categories, the univariate (independent IDS for each sensor variables) [9], [28], [29], [36] and multivariate (an IDS model takes input from the multiple sensor variables) [31], [32], [33], [37], [21], [34], [35], [38]. In [39], the authors developed a PLC rootkit that can corrupt the communication route between sensors and SCADA.…”
Section: Related Workmentioning
confidence: 99%
“…Spectra is rooted in singular spectrum analysis (SSA), a time-series analysis technique mainly used to explore different behavioral characteristics of a dynamical system purely from noisy time series of measurements [5,14,15,35]. Inherently, SSA can extract essential signal information describing the deterministic behavior of the underlying system and has recently been used for anomaly detection in cyber-physical systems [1][2][3][4]17]. Spectra takes as input a time series of CAN-message payloads and works in two phases: an offline learning phase and an online detection phase.…”
Section: Spectral Analysis Of Can Trafficmentioning
confidence: 99%
“…Rarely, such IIDSs use additional packet features, e.g., packet sizes or checksums for their classification. Still, none of the approaches takes advantage of protocol-specific information or behavior, such that, in theory, the various approaches could be [23] 2015 DTMC S B 1 EtherNet/IP Ahmed et al [6] 2017 Kalman Filter S B 1 -PASAD [15,16] 2018 PCA S B S T 3 Modbus EtherNet/IP Choi et al [28] 2018 Control Invariants S B 1 -Myers et al [85] 2018 Petri-nets S B 1 S7 Kravchik et al [73] 2018 Neural Networks S B 1 EtherNet/IP TABOR [79] 2018 TA, BN S B S 1 EtherNet/IP Anton et al [14] 2019 Matrix Profiles S B S 1 EtherNet/IP HybTester [25] 2019 Hybrid-Automata S B S 1 EtherNet/IP Kim et al [66] 2019 Neural Networks S B S 1 EtherNet/IP Denque Anton [12] 2020 Table 1: Our analysis of the potential for realizing protocol-independent IIDSs relies on a survey of 53 intrusion detection approaches confirming the heterogeneity across the industrial research landscape. While IIDSs operate on few information types, they are mostly developed in isolated silos and seldomly compare to other existing research.…”
Section: Communication-based Intrusion Detectionmentioning
confidence: 99%