Process-aware security monitoring in industrial control systems: A systematic review and future directions

M ur Rehman, H Bahşi - International Journal of Critical Infrastructure …, 2024 - Elsevier
Due to the tight coupling between the cyber and physical components, control systems are
subjected to emerging cyberattacks. In addition to attacks based on networking and …

{SAIN}: Improving {ICS} Attack Detection Sensitivity via {State-Aware} Invariants

SG Abbas, MO Ozmen, A Alsaheel, A Khan… - 33rd USENIX Security …, 2024 - usenix.org
Industrial Control Systems (ICSs) rely on Programmable Logic Controllers (PLCs) to operate
within a set of states. The states are composed of variables that determine how sensor data …

PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS

S Li, Y Chen, X Chen, Z Li, D Fang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Motion control systems, extensively utilized in domains like 3D printing, CNC machining,
and robotic arm operations, are pivotal in modern manufacturing and automation processes …

Control Logic Attack Detection and Forensics through Reverse-engineering and Verifying PLC Control Applications

Y Geng, X Che, R Ma, Q Wei, M Wang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Industrial control systems (ICSs) are prevalent in critical infrastructures, where
programmable logic controllers (PLCs) and physical instruments are integrated. However …

DpGuard: A Lightweight Attack Detection Method for an Industrial Bus Network

Z Li, Q Wei, R Ma, Y Geng, Y Yang, Z Lv - Electronics, 2023 - mdpi.com
In industrial control systems (ICSs), the PROFIBUS-DP (decentralized peripherals) protocol
is widely used for communication between devices. Because PROFIBUS-DP is an …

Dynamic Data Abstraction-Based Anomaly Detection for Industrial Control Systems

J Cho, S Gong - Electronics, 2023 - mdpi.com
Industrial control systems (ICS) are critical networks directly linked to the value of core
national and societal assets, yet they are increasingly becoming primary targets for …

Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS

P Roy, A Al-Tawaha, R Jia, L Freeman, P Beling… - arxiv preprint arxiv …, 2024 - arxiv.org
There is an upward trend of deploying distributed energy resource management systems
(DERMS) to control modern power grids. However, DERMS controller communication lines …

Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process Attacks

M Ike, K Phan, A Badapanda, M Landen… - arxiv preprint arxiv …, 2023 - arxiv.org
Modern industrial control systems (ICS) attacks infect supervisory control and data
acquisition (SCADA) hosts to stealthily alter industrial processes, causing damage. To detect …

TRACE DATA-DRIVEN DEFENSE AGAINST CYBER AND CYBER-PHYSICAL ATTACKS. pdf

AAM Alsaheel - 2023 - hammer.purdue.edu
In the contemporary digital era, Advanced Persistent Threat (APT) attacks are evolving,
becoming increasingly sophisticated, and now perilously targeting critical cyber-physical …

[PDF][PDF] TRACE DATA-DRIVEN DEFENSE AGAINST CYBER AND CYBER-PHYSICAL ATTACKS

A Alsaheel - 2023 - hammer.purdue.edu
2 TRACE-DRIVEN CYBER ATTACK INVESTIGATIONS............... 2.1 Introduction.......................
............. 2.2 Motivation and Definitions............................. 2.2. 1 Definitions …