2022
DOI: 10.1007/978-3-031-17143-7_28
|View full text |Cite
|
Sign up to set email alerts
|

Can Industrial Intrusion Detection Be SIMPLE?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 70 publications
0
7
0
Order By: Relevance
“…1, researchers should extend their focus beyond optimal attack detection coverage and on the required actions after IIDS alerts. Such actions may include steps to reduce the number of false alerts by fusing multiple IIDSs [85], enhance the understandability of alert [23,71], localize the attacker [4], mitigate an attack's damage potential [75], recover the system to a safe state [83], and lastly, perform forensics to learn for the future [42]. Given this chain of tasks operators have to execute, which may include temporal interruptions of the process, it may also be crucial for researchers to consider the costs of (false) alarms emitted by their solutions.…”
Section: Further Recommendations and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…1, researchers should extend their focus beyond optimal attack detection coverage and on the required actions after IIDS alerts. Such actions may include steps to reduce the number of false alerts by fusing multiple IIDSs [85], enhance the understandability of alert [23,71], localize the attacker [4], mitigate an attack's damage potential [75], recover the system to a safe state [83], and lastly, perform forensics to learn for the future [42]. Given this chain of tasks operators have to execute, which may include temporal interruptions of the process, it may also be crucial for researchers to consider the costs of (false) alarms emitted by their solutions.…”
Section: Further Recommendations and Discussionmentioning
confidence: 99%
“…For knowledge-based IIDSs, we examine five machine learning approaches [65,84] originally evaluated on the Morris-Gas dataset. Regarding process data, we leverage five behaviorbased IIDSs, with TABOR basing on timed automata [54], Seq2SeqNN utilizing neural networks [44], PASAD leveraging singular spectrum analysis [7], SIMPLE implementing minimalistic boundary checks [86], and Invariant mining invariant logical formulas [25]. Contrary to the knowledgebased machine learning approaches, these IIDSs are evaluated on the temporally ordered SWaT dataset, which provides dedicated attack-free training data and testing data, including anomalies.…”
Section: Experiments Designmentioning
confidence: 99%
See 3 more Smart Citations