Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing
industrial control system (ICS) traffic data plays a central role in detecting and defending …
industrial control system (ICS) traffic data plays a central role in detecting and defending …
IPAL: breaking up silos of protocol-dependent and domain-specific industrial intrusion detection systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
Experimental assessment of network design approaches for protecting industrial control systems
This paper surveys and provides experimental results related to network design techniques
focused on enhancing the security of industrial control systems. It analyzes defense-in-depth …
focused on enhancing the security of industrial control systems. It analyzes defense-in-depth …
Flow whitelisting in SCADA networks
Supervisory control and data acquisition (SCADA) networks are commonly deployed in
large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber …
large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber …
The industrial control system cyber defence triage process
Abstract The threat to Industrial Control Systems (ICS) from cyber attacks is widely
acknowledged by governments and literature. Operators of ICS are looking to address these …
acknowledged by governments and literature. Operators of ICS are looking to address these …
A clustering-based approach to detect cyber attacks in process control systems
Modern Process Control Systems (PCS) exhibit an increasing trend towards the pervasive
adoption of commodity, off-the-shelf Information and Communication Technologies (ICT) …
adoption of commodity, off-the-shelf Information and Communication Technologies (ICT) …
Design and implementation of cybersecurity testbed for industrial IoT systems
In the era of Industry 4.0, information and communication technology (ICT) has been applied
to various critical infrastructures, such as power plants, smart factories, and financial …
to various critical infrastructures, such as power plants, smart factories, and financial …
Real-time scada attack detection by means of formal methods
SCADA control systems use programmable logic controller to interface with critical
machines. SCADA systems are used in critical infrastructures, for instance, to control smart …
machines. SCADA systems are used in critical infrastructures, for instance, to control smart …
Efficient modelling of ICS communication for anomaly detection using probabilistic automata
Industrial Control System (ICS) communication transmits monitoring and control data
between industrial processes and the control station. ICS systems cover various domains of …
between industrial processes and the control station. ICS systems cover various domains of …
Detecting semantic attack in SCADA system: A behavioral model based on secondary labeling of states-duration evolution graph
L Xu, B Wang, X Wu, D Zhao, L Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
By violating semantic constraints that the control process impose, the semantic attack leads
the Industry Control Systems (ICS) into an undesirable state or critical state. The spread of …
the Industry Control Systems (ICS) into an undesirable state or critical state. The spread of …