Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3103155
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The employed methods use OD for intrusion detection/attack detection and prevention. Kreimel et al [ 12 ] achieve good results on a small dataset with a low feature space using k-nearest neighbor (k-NN) to differentiate outliers and a naïve Bayes classifier to predict the outlier class label. An advantage of Kreimel’s approach is that the approach can detect unknown cases.…”
Section: Related Workmentioning
confidence: 99%
“…The employed methods use OD for intrusion detection/attack detection and prevention. Kreimel et al [ 12 ] achieve good results on a small dataset with a low feature space using k-nearest neighbor (k-NN) to differentiate outliers and a naïve Bayes classifier to predict the outlier class label. An advantage of Kreimel’s approach is that the approach can detect unknown cases.…”
Section: Related Workmentioning
confidence: 99%
“…Using network telemetry analysis and choosing a set of factors that are relatively difficult for attackers to control [25], an Intrusion Detection Systems (IDS) has been demonstrated to be able to differentiate malicious traffic from the legitimate SCADA operations. There are also other anomaly-based IDS approaches, such as [26] and [27] that involve the monitoring network traffic associated with the Siemens S7 communication protocol. It is anticipated that the discoveries presented in this paper, which include new network-based exploits, can contribute to improving network-based monitoring and detection approaches for the PLC network environment.…”
Section: Mitigation For Plc Exploitsmentioning
confidence: 99%
“…After that, the cumulative sum method was used for identifying the abnormalities in a water management plant. Anomaly-based detection approach [6] was proposed to detect and classify the attacks in CPS. Initially, anomaly detection was used for defining normal system characteristics based on the computation of outlier scores.…”
Section: Survey On Cyber-attack Detection Schemesmentioning
confidence: 99%