2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2017
DOI: 10.1109/eurospw.2017.62
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
32
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(32 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…In [16], the authors proposed Support Vector Machine (SVM)-based technique to detect cyber-attacks on Industrial Control Systems (ICS) based on communication profile. They employed SVM with different optimization of the hyperparameters to classify malicious and benign traffic on their own testbed.…”
Section: A Supervised Machinel Learning Papersmentioning
confidence: 99%
See 2 more Smart Citations
“…In [16], the authors proposed Support Vector Machine (SVM)-based technique to detect cyber-attacks on Industrial Control Systems (ICS) based on communication profile. They employed SVM with different optimization of the hyperparameters to classify malicious and benign traffic on their own testbed.…”
Section: A Supervised Machinel Learning Papersmentioning
confidence: 99%
“…Each process dependent on the previous one and having one dedicated separate PLC. They used nine supervised machine learning (ML) algorithms: Neural Networks (NNs), SVM, Logistic Regression (LR), Random Forest (RF), J48, Best-First Tree (BFTree), Bayesian Network (BayesNet), Naive Bayes (NB) and Instance-based Learning [16](IBK) with various parameter values to find the best parameters for each classifier. They employed 18 attacks from 10 different types to build the model for their nine machine learning algorithms.…”
Section: A Supervised Machinel Learning Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…In [8], a Support Vector Machine (SVM) was employed, and a proposed an Intrusion Detection System (IDS) with a discriminant model to detect cyber-attacks on Industrial Control Systems (ICS) was presented. Their proposed model was based on a communication profile analysis which considers only packet intervals and packet length.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the normal models or profiles are built from multivariate training data, and the corresponding anomaly detection is realized by using the mechanism of classification or optimization. Actually, the computational intelligence techniques have been attracting great interests of both industry and academia, and many computational intelligence approaches have been researched, mainly including SVM (Support Vector Method) [15,24,25], neural network [26], decision trees [27], genetic algorithm [27,28], and clustering technique [29]. Although the computational intelligence-based techniques have the relatively high computational overhead, they can achieve better performance in detection, tolerance, and generality [14].…”
Section: Related Workmentioning
confidence: 99%