2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2018
DOI: 10.1109/cybersecpods.2018.8560683
|View full text |Cite
|
Sign up to set email alerts
|

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system

Abstract: Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms, hardware capabilities, and connectivity with networks inside and outside the organization. Consequently, the Industrial Control Systems components are exposed to sophisticated threats with weak security mechanism in place. This paper proposes a supervised energy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…In our previous work [22], we physically modelled a continuous clean water supply system using the default configuration of the Festo MPS PA Compact Workstation Rig. However, to make this experiment more realistic, we changed the configuration of the Festo Rig.…”
Section: Design and Implementationmentioning
confidence: 99%
“…In our previous work [22], we physically modelled a continuous clean water supply system using the default configuration of the Festo MPS PA Compact Workstation Rig. However, to make this experiment more realistic, we changed the configuration of the Festo Rig.…”
Section: Design and Implementationmentioning
confidence: 99%
“…However, we find out this threat model applicable in a scenario where the hacker is an insider who has access to the organisation [29]. We use a testbed implemented in our previous work [30] to demonstrate the effectiveness of this data exfiltration scenario.…”
Section: Threat Modelmentioning
confidence: 99%
“…In this paper, we use a model of a clean water supply system using the Festo MPS PA Compact Workstation Rig [31]. The operation of this control system is fully described in our previous work [30]. Fig 1 shows the testbed implemented for this paper.…”
Section: A Testbedmentioning
confidence: 99%
“…In the author's previous work, the feasibility of detecting cyber attacks was demonstrated in a control process by monitoring the energy consumption of the pump [19]. In the first attempt, this was by monitoring the energy consumption of the ultrasonic sensor and the flowmeter; however, these sensors consume a low amount of energy which makes monitoring the energy consumption difficult.…”
Section: Mechanisms Of Attack Detectionmentioning
confidence: 99%