2023
DOI: 10.1016/j.cose.2022.103010
|View full text |Cite
|
Sign up to set email alerts
|

Forensic readiness of industrial control systems under stealthy attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 37 publications
(90 reference statements)
0
3
0
Order By: Relevance
“…The automated industry relies on the Industrial Control System (ICS). The ICS consists of various types of controllers that are used to control the industrial plants and monitor their performance to guarantee their accurate operations [4,5]. There are various types of ICSs, such as distributed control systems (DCS), programmable logic controllers (PLC), supervisory control, and data acquisition systems (SCADA).…”
Section: Introductionmentioning
confidence: 99%
“…The automated industry relies on the Industrial Control System (ICS). The ICS consists of various types of controllers that are used to control the industrial plants and monitor their performance to guarantee their accurate operations [4,5]. There are various types of ICSs, such as distributed control systems (DCS), programmable logic controllers (PLC), supervisory control, and data acquisition systems (SCADA).…”
Section: Introductionmentioning
confidence: 99%
“…We used advanced machine learning and data analysis techniques to identify anomalous patterns and suspicious behavior that indicate intrusion attempts or malicious activity. These AI systems operate under conditions that require high precision and speed to be effective, such as real-time detection and continuous monitoring, enabling a rapid, automated response that minimizes potential damage and improves infrastructure resilience [22].…”
Section: Definition Of the Problemmentioning
confidence: 99%
“…At the same time, for investigators, advanced data collection would help speed up the investigation process www.ijacsa.thesai.org because the data is already available. This proactive approach is essential in digital investigation, especially in environments like social networks where editing and deleting messages are common for users to remove their unwanted traces; also, in critical systems such as Industrial Control Systems where realtime analysis may enable rapid triaging and response to attack [16], [17]. Meanwhile, the live data collection approach can be conducted by recording data from the running activities.…”
Section: Related Workmentioning
confidence: 99%