2019
DOI: 10.1109/tii.2019.2891261
|View full text |Cite
|
Sign up to set email alerts
|

Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 278 publications
(102 citation statements)
references
References 16 publications
0
102
0
Order By: Relevance
“…The associate editor coordinating the review of this manuscript and approving it for publication was Mohammad S Khan . disturbing Information Technology (IT) systems [5]. In 2015, another cyberattack by the name of Black-Energy was used to target Ukraine's power grids, causing a massive power outage that affected about 230,000 people [6].…”
Section: Stuxnet Intended To Sabotage the System's Operation Withoutmentioning
confidence: 99%
See 1 more Smart Citation
“…The associate editor coordinating the review of this manuscript and approving it for publication was Mohammad S Khan . disturbing Information Technology (IT) systems [5]. In 2015, another cyberattack by the name of Black-Energy was used to target Ukraine's power grids, causing a massive power outage that affected about 230,000 people [6].…”
Section: Stuxnet Intended To Sabotage the System's Operation Withoutmentioning
confidence: 99%
“…Consequently, safety mechanisms, which were not designed to deal with malicious attacks, face more vulnerabilities than ever before. The majority of current existing techniques on cyber-attack detection in ICSs are based on traditional IDSs, which are mainly designed for IT security analysis [5], [17]. IDSs can be categorized as signature-based and learning-based techniques.…”
Section: Related Workmentioning
confidence: 99%
“…They offer an edge against signature-based IDS as they can detect unknown attacks providing better security to a network. There is another type of IDS known as hybrid IDS, which combines both the above-mentioned approaches for better detection of intrusions [4]. The security of today's computer networks can be improved through an IDS.…”
Section: S Siva Priya Bipin Kumar Sahu Badal Kumar Mayank Yadavmentioning
confidence: 99%
“…These systems work mutually dependently based on a wide variety of Industrial Internet of Things (IIoT) devices for sensing and actuation. Nowdays, IACS are facing more and more cybersecurity issues [1], [2], [3], [4]. In order to assure that the systems can run exactly as expected, it is important to guarantee the correctness of the configurations of IACS as well as the massive IIoT devices.…”
Section: Introductionmentioning
confidence: 99%