2021
DOI: 10.3390/app11010367
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Vulnerabilities in Critical Infrastructures by Classifying Exposed Industrial Control Systems Using Deep Learning

Abstract: Industrial control systems depend heavily on security and monitoring protocols. Several tools are available for this purpose, which scout vulnerabilities and take screenshots of various control panels for later analysis. However, they do not adequately classify images into specific control groups, which is crucial for security-based tasks performed by manual operators. To solve this problem, we propose a pipeline based on deep learning to classify snapshots of industrial control panels into three categories: i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 34 publications
0
10
0
1
Order By: Relevance
“…Ebrahimi et al [17] proposed a Transductive Support Vector Machines (TSVM) algorithm and a deep bidirectional Long Short-Term Memory (LSTM) algorithm for semi-supervised threat identification and labeling. Medina et al [18] employed Inception-ResNet-V2 architecture and VGG16 architecture on transfer learning and finetuning to detect vulnerabilities in industrial control systems. Of course, these are not an exhaustive list but give insights into how ML techniques could be used in the construction industry in risk identification, such as identifying an attack by detecting abnormal data flow in computers, identifying a phishing email received by contractors by analyzing the text, identifying an intentional data-stealing of building plans by detecting the excessive attempts of log-in, etc.…”
Section: Machine Learning In Risk Identificationmentioning
confidence: 99%
“…Ebrahimi et al [17] proposed a Transductive Support Vector Machines (TSVM) algorithm and a deep bidirectional Long Short-Term Memory (LSTM) algorithm for semi-supervised threat identification and labeling. Medina et al [18] employed Inception-ResNet-V2 architecture and VGG16 architecture on transfer learning and finetuning to detect vulnerabilities in industrial control systems. Of course, these are not an exhaustive list but give insights into how ML techniques could be used in the construction industry in risk identification, such as identifying an attack by detecting abnormal data flow in computers, identifying a phishing email received by contractors by analyzing the text, identifying an intentional data-stealing of building plans by detecting the excessive attempts of log-in, etc.…”
Section: Machine Learning In Risk Identificationmentioning
confidence: 99%
“…It is also possible to extract artificially added text to an image, such as subtitles or watermarks [2]. Applications of Text Spotting can be found in the Industrial field, such as assembly lines [3,4], video indexing [1], document analysis [5], robot navigation [6,7], automatic classification of Information / Operational Technology (IT/OT) snapshots in Industrial Control Systems [8], or identification of port containers [9]. In CyberSecurity, it can be applied to retrieve text found in images from Tor (The Onion Router) darknet, which can be linked to the sale of weapons, document falsification [10] from suspicious domains [11] or from child sexual abuse (CSA) images.…”
Section: Introductionmentioning
confidence: 99%
“…Un problema para la adopción de CNNs en nuevas aplicaciones es la escasez de imágenes convenientemente etiquetadas para casos de aplicación o modalidades específicas [2]. En este sentido, las técnicas de transferencia de conocimiento han demostrado eficacia en distintas aplicaciones [7] y se pueden combinar con operaciones de aumento de datos para conseguir buenos resultados a partir de conjuntos de datos reducidos [8].…”
Section: Introductionunclassified