2019
DOI: 10.5937/fmet1904782s
|View full text |Cite
|
Sign up to set email alerts
|

Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking

Abstract: Modern industrial control systems (ICS) are increasingly becoming targets of cyber attacks. Traditional security tools based on a signature approach are not always able to detect a new attack, the signature of which has not yet been described. In particular, this occurs during targeted attacks on industrial facilities. Cyber attacks can cause anomalies in the operation of an industrial control system and process equipment under its control. Therefore, to detect attacks, it is advisable to use an approach based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…Fault/anomaly detection: Sokolov et al [ 29 ] investigated the use of ML to detect process anomalies of sensor readings and controller settings as an indicator for targeted cyberattacks in industrial plants. One example featured a chemical reaction plant consisting of a reactor, a condenser, a vapor–liquid separator, a compressor, and a stripper using the “Tennessee Eastman process simulation data for anomaly detection evaluation.” Dataset with eight chemical components (A–H) were involved, along with the target components being G and H, shown in Figure .…”
Section: Ai Applications In Process Engineeringmentioning
confidence: 99%
See 3 more Smart Citations
“…Fault/anomaly detection: Sokolov et al [ 29 ] investigated the use of ML to detect process anomalies of sensor readings and controller settings as an indicator for targeted cyberattacks in industrial plants. One example featured a chemical reaction plant consisting of a reactor, a condenser, a vapor–liquid separator, a compressor, and a stripper using the “Tennessee Eastman process simulation data for anomaly detection evaluation.” Dataset with eight chemical components (A–H) were involved, along with the target components being G and H, shown in Figure .…”
Section: Ai Applications In Process Engineeringmentioning
confidence: 99%
“…One example featured a chemical reaction plant consisting of a reactor, a condenser, a vapor–liquid separator, a compressor, and a stripper using the “Tennessee Eastman process simulation data for anomaly detection evaluation.” Dataset with eight chemical components (A–H) were involved, along with the target components being G and H, shown in Figure . [ 29 ]…”
Section: Ai Applications In Process Engineeringmentioning
confidence: 99%
See 2 more Smart Citations
“…Autoregression modeling and control limits techniques deployed for PLC security monitoring in [11], also belong to the data-centric group. A comparison of the performances of linear classification methods (Logistic Regression, Lasso, Support Vectors based classification with linear kernel), decision trees, and fully connected neural networks in cyber attacks detection in networked industrial control systems is presented in [12]. The analysis has shown that among the considered techniques fully connected neural networks presented the best accuracy (around 80%).…”
Section: Introductionmentioning
confidence: 99%