2014
DOI: 10.1016/j.cose.2014.07.005
|View full text |Cite
|
Sign up to set email alerts
|

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(40 citation statements)
references
References 16 publications
0
40
0
Order By: Relevance
“…The use of ICS helps in increasing productivity, quality and flexibility in the manufacturing process (Almalawi et al, 2014).…”
Section: Industrial Automation and Controld System -Iacsmentioning
confidence: 99%
“…The use of ICS helps in increasing productivity, quality and flexibility in the manufacturing process (Almalawi et al, 2014).…”
Section: Industrial Automation and Controld System -Iacsmentioning
confidence: 99%
“…The "home-area view" we suggest aims to detect arbitrary data injection attempts at their origin, i.e., compromised residential smart meters. Our framework complements the above-mentioned work since the alert output signal generated by our methods could serve as an additional input 3 to [18], [26]- [28].…”
Section: Related Workmentioning
confidence: 87%
“…Such countermeasures for detecting false data injection appear in [18], [26]- [28]. [26] proposes an adaptive cumulative sum test combined with a multivariate hypothesis testing problem to prevent an erroneous grid-state estimate.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed test bed includes a comparison module that helps to identify potential attacks in the system. Almalawi et al [6] have suggested an unsupervised learning algorithm that will optimize the SCADA network traffic. They have used numerous pre-processing methods to control the integrity of the outlier data, in the data set of water plants.…”
Section: Introductionmentioning
confidence: 99%