Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 2015
DOI: 10.1145/2732198.2732200
|View full text |Cite
|
Sign up to set email alerts
|

Sequence-aware Intrusion Detection in Industrial Control Systems

Abstract: Nowadays, several threats endanger cyber-physical systems. Among these systems, industrial control systems (ICS) operating on critical infrastructures have been proven to be an attractive target for attackers. The case of Stuxnet has not only showed that ICSs are vulnerable to cyber-attacks, but also that some of these attacks rely on understanding the processes beyond the employed systems and using such knowledge to maximize the damage. This concept is commonly known as "semantic attack". Our paper discusses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 132 publications
(102 citation statements)
references
References 18 publications
0
102
0
Order By: Relevance
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
“…Legacy systems without inherent security mechanisms have to be addressed [15,18,34], critical states that can have severe effects on the physical world need to be prevented [28] and deterministic behaviour of processes can be leveraged to detect anomalies [23]. Sequences are relatively unifom in industrial applications, this characteristic can be incorporated into an IDS [3]. Tsang and Kwong present an industrial IDS based on the ant colony clustering approach [46].…”
Section: Related Workmentioning
confidence: 99%
“…Alg. 1 l. [1][2][3][4][5][6][7][8][9][10][11][12][13][14], processing its events. S2 extracts the attributes of an event and stores them in variable 'State DT M C ' (c.f.…”
Section: Representing Traffic Sequences As Dtmcsmentioning
confidence: 99%
“…We use the same algorithm and thresholds as explained in [12]. The thresholds for both a state violation and transition violation equal 0.1.…”
Section: Detectionmentioning
confidence: 99%
“…This approach has been tested against three real critical infrastructure facilities over two weeks of normal operations. Part of this chapter has appeared in a refereed conference publication [3] and in a refereed workshop publication [2].…”
Section: Thesis Overview and Contributionsmentioning
confidence: 99%