2020
DOI: 10.1016/j.iot.2020.100320
|View full text |Cite
|
Sign up to set email alerts
|

Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…Perturbation is a technique for limiting the leakage of sensitive data by inserting noise [ 20 ]. A defender can use perturbations to initiate Defensive Deception via external noises [ 19 ].…”
Section: Defensive Deceptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Perturbation is a technique for limiting the leakage of sensitive data by inserting noise [ 20 ]. A defender can use perturbations to initiate Defensive Deception via external noises [ 19 ].…”
Section: Defensive Deceptionmentioning
confidence: 99%
“…Both insider and outsider attacks can be prevented using Deception. These days machine learning has emerged as an effective technology that provides us with a wide range of applications ranging from recognition of patterns, image identification, image, and video processing, making predictions, virus or malware detection, autonomous driving, and other application scenarios [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 ]. The advantages of machine learning algorithms can be extended for deploying Defensive Deception frameworks [ 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , …”
Section: Introductionmentioning
confidence: 99%
“…The overall control of the operation is conducted in the control centers, which consist of computers, databases, servers, HMIs, etc. The statuses of the monitored and controlled physical processes are presented on the HMI consoles [2]. Moreover, HMIs present a graphical display of various emergency notifications, such as alerts and warnings, which allow operators to interact with the systems [7,31].…”
Section: Brief Overview Of Modern Scada Architecturementioning
confidence: 99%
“…Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs), which includes power systems, water distribution systems, gas plants, wastewater collection systems, etc. [1][2][3][4]. The stringent real-time requirements, growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of the infrastructures to various vulnerabilities and security challenges such as sabotage, terrorism and intrusions [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Although being effective in some settings, existing defense approaches against PLC-oriented attacks have the following key limitations. Firstly, defending approaches adopted by intrusion detection systems (IDSs) [9][10][11] , deception defense [12][13][14] and attestation [15][16][17][18][19] take effect after attacks happened, mainly detecting them but not blocking them, while blocking technologies such as industrial firewalls alone are not able to effectively block growing sophisticated attacks [20][21][22] . Secondly, most existing approaches are designed based on the characteristics of one or several specific kinds of known attacks, such as [9,13,15].…”
Section: Introductionmentioning
confidence: 99%