Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy 2020
DOI: 10.1145/3411498.3419961
|View full text |Cite
|
Sign up to set email alerts
|

A Statistical Analysis Framework for ICS Process Datasets

Abstract: In recent years, several schemes have been proposed to detect anomalies and attacks on Cyber-Physical Systems (CPSs) such as Industrial Control Systems (ICSs). Based on the analysis of sensor data, unexpected or malicious behavior is detected. Those schemes often rely on (implicit) assumptions on temporally stable sensor data distributions and invariants between process values. Unfortunately, the proposed schemes often do not perform optimally, with Recall scores lower than 70% (e.g., missing 3 alarms every 10… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Data are provided in different csv, xlsx, and pcap formats. As reported in [240], the various SWAT releases are very different from the operational point of view, also implementing different actuators control logic. It makes it difficult to transfer the detection framework among the dataset releases.…”
Section: F Physical and Network Levelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Data are provided in different csv, xlsx, and pcap formats. As reported in [240], the various SWAT releases are very different from the operational point of view, also implementing different actuators control logic. It makes it difficult to transfer the detection framework among the dataset releases.…”
Section: F Physical and Network Levelsmentioning
confidence: 99%
“…Exhaustive documentation should include the system's control logic, a description of the implemented attacks, and the configuration settings. In the SWaT case, as reported in [240], the recent versions of the dataset implement different control logic. However, the authors never mentioned such modifications.…”
Section: B Good Practices: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…To analyze the ability of existing IIDSs to detect unseen sensor spoofing attacks, the only reproducibility study (considering only model-free state process-based IIDSs) known to us [35] shows significant differences between expected (claimed) generalizability and reality. These works, in addition to issues with widely-used datasets [108], motivate us to quantify these problems and ultimately mitigate them through protocol independence.…”
Section: Further Related Workmentioning
confidence: 99%
“…Moreover, the use of only a few datasets per domain (e.g., SWaT [48]) together with many private ones steers the collective research efforts in a direction where solutions are optimized and biased towards specific scenarios. This problem is already known for traditional IDSs [89] but is even more severe in industrial settings, where systems expose very narrow yet domain-specific behavior [107].…”
Section: Limitations Of Current Iids Researchmentioning
confidence: 99%