2020
DOI: 10.1109/access.2020.2998983
|View full text |Cite
|
Sign up to set email alerts
|

Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems

Abstract: This paragraph of the first footnote will contain support information, including sponsor and financial support acknowledgment.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…[24] Provides foundational understanding of IoT architectures, essential for IoT security. [25] Discusses behavior-based attack recognition in industrial control systems within IoT. [26] Addresses the critical area of firmware updates for IoT devices.…”
Section: Ref Contribution and Significance [5]mentioning
confidence: 99%
See 1 more Smart Citation
“…[24] Provides foundational understanding of IoT architectures, essential for IoT security. [25] Discusses behavior-based attack recognition in industrial control systems within IoT. [26] Addresses the critical area of firmware updates for IoT devices.…”
Section: Ref Contribution and Significance [5]mentioning
confidence: 99%
“…IDS powered by AI algorithms, such as anomaly detection [56] or behavior-based models [25], can identify potential security breaches and mitigate cyberattacks. These IDS systems continuously monitor network traffic, device activities, and system logs to detect deviations from normal behavior [57].…”
Section: A Threat Detection and Preventionmentioning
confidence: 99%
“…The results comparatively proves high in case of accuracy with 97.02% with detection rate of 97% and 0.16% false alarm rate [48]. Considering the alert identification as a unique parameter, to improve the significance of detection for hidden attacks, Capture The Invisible (CTI) is used as a pattern recognition algorithm as proposed by Bhardwaj A et.al [49]. The authors suggest that repeated testing with dynamic datasets helps to discover invisible attacks compared to the Inductive Miner algorithm [49].…”
Section: A Machine Learning-based Solutionsmentioning
confidence: 99%
“…Considering the alert identification as a unique parameter, to improve the significance of detection for hidden attacks, Capture The Invisible (CTI) is used as a pattern recognition algorithm as proposed by Bhardwaj A et.al [49]. The authors suggest that repeated testing with dynamic datasets helps to discover invisible attacks compared to the Inductive Miner algorithm [49]. A summary of the solutions based on machine learning is shown in Table 5.…”
Section: A Machine Learning-based Solutionsmentioning
confidence: 99%
“…Cloud computing has shown remarkable development in recent decades. When the storage as a service, it occupies the center stage and backbone for many applications, such as pattern recognition [1], image forensic [2] and forgery detection [3]. As a result, larger volumes of data will be a part of the cloud area.…”
Section: Introductionmentioning
confidence: 99%