2022
DOI: 10.1016/j.cose.2021.102585
|View full text |Cite
|
Sign up to set email alerts
|

CNN based method for the development of cyber-attacks detection algorithms in industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(17 citation statements)
references
References 19 publications
1
16
0
Order By: Relevance
“…Surprisingly, the optimized MLP architecture achieved the highest performance on the SWaT testbed in terms of F1 score. Recently, Nedeljkovic and Jakovljevic in [ 14 ] developed a method that consisted of several one-step forecasting univariate 1D-CNN models that are trained with attack-free data. Unlike our approach, only sensor signals are used, and the hyperparameters of the CNN architectures are individually optimized with a grid-based strategy for each signal separately.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Surprisingly, the optimized MLP architecture achieved the highest performance on the SWaT testbed in terms of F1 score. Recently, Nedeljkovic and Jakovljevic in [ 14 ] developed a method that consisted of several one-step forecasting univariate 1D-CNN models that are trained with attack-free data. Unlike our approach, only sensor signals are used, and the hyperparameters of the CNN architectures are individually optimized with a grid-based strategy for each signal separately.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the evaluation in [ 44 ], none of the stealthy attacks (Attacks 3, 16, 41) in the level-sensory signals were detected by TABOR. Our causal-based approach, such as the CNN-based approach [ 14 ], not only detected these attacks via both univariate and multivariate models, but their sensory signals signified the component (level sensor) that was indeed under attack. The dual isolation-forest-based (DIF) framework, as is presented in [ 38 ], was capable of detecting stealthy Attacks 16 and 41, while Attack 3 was missed.…”
Section: Case Studymentioning
confidence: 99%
See 2 more Smart Citations
“…Neural networks (NN) exhibit impressive performance and are now being assisted in many different areas such as medical diagnosis, computer vision, autonomous driving, and cyber attack detection. In particular, these technologies have been introduced to monitor and detect possible incoming cyber attacks that target Industrial Control Systems (ICS), a subset of cyber-physical systems (CPS) [11,12,14,28,29,34,53,52,55,56,18,23,25,40]. Defending these systems is extremely important, since ICSs are central to many areas of industry, energy production, and critical infrastructure, and they are exposed to external threats as they need to be remotely accessible by operators.…”
Section: Introductionmentioning
confidence: 99%