2015
DOI: 10.1109/tsmc.2015.2415763
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
79
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 144 publications
(79 citation statements)
references
References 42 publications
0
79
0
Order By: Relevance
“…1) The Comparison of Original System and Partitioned System: A spoofing attack [9] is designed to act on the original CTCS and z 1 of the partitioned CTCS respectively, which modifies the configuration of the set point of L 1 , and maintains all the measured values from PLCs to HMI at the instant of 50 in the two systems. Fig.…”
Section: B Experiments and Results Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…1) The Comparison of Original System and Partitioned System: A spoofing attack [9] is designed to act on the original CTCS and z 1 of the partitioned CTCS respectively, which modifies the configuration of the set point of L 1 , and maintains all the measured values from PLCs to HMI at the instant of 50 in the two systems. Fig.…”
Section: B Experiments and Results Analysismentioning
confidence: 99%
“…3) Detection Performance of the Proposed Approach: Accuracy and real-time capability are the two most important criteria for evaluating the performance of detection systems, and the four well-known metrics: False Positive Rate (FPR), False Negative Rate (FNR), Detecion Accuracy (DA) and Detecion Time (DT) are used, whose definition can be found in [9]. First, the following two factors, which are the most important reasons for influencing the detection performance, need be analyzed.…”
Section: B Experiments and Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Industrial control systems (ICSs) are widely deployed in modern critical infrastructures (CIs), and their incapacitation can cause serious damage to equipment, environment, or even people's lives [1]. During the past ten years, many efforts have been made to improve the security of ICSs [2,3].…”
Section: Introductionmentioning
confidence: 99%