All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection
The Internet of Things (IoT) is a Distributed System of cooperating Microservices (μSs). IoT
services manage devices that monitor and control their environments. The interaction of the …
services manage devices that monitor and control their environments. The interaction of the …
A novel bi-anomaly-based intrusion detection system approach for industry 4.0
S Alem, D Espes, L Nana, E Martin… - Future Generation …, 2023 - Elsevier
Abstract Today, industry 4.0 is becoming a major target for cybercriminals due to its hyper-
connectivity. Fortunately, there are several advanced means of securing industrial systems …
connectivity. Fortunately, there are several advanced means of securing industrial systems …
[HTML][HTML] Protocol study and anomaly detection for server-driven traffic in SCADA networks
CY Lin, S Nadjm-Tehrani - International Journal of Critical Infrastructure …, 2023 - Elsevier
Abstract Attacks against Supervisory Control and Data Acquisition (SCADA) systems
operating critical infrastructures have largely appeared in the past decades. There are …
operating critical infrastructures have largely appeared in the past decades. There are …
Scada world: An exploration of the diversity in power grid networks
Despite a growing interest in understanding the industrial control networks that monitor and
control our critical infrastructures (such as the power grid), to date, SCADA networks have …
control our critical infrastructures (such as the power grid), to date, SCADA networks have …
Analysis of machine learning methods in EtherCAT-based anomaly detection
Today, the use of Ethernet-based protocols in industrial control systems (ICS)
communications has led to the emergence of attacks based on information technology (IT) …
communications has led to the emergence of attacks based on information technology (IT) …
Understanding IEC-60870-5-104 traffic patterns in SCADA networks
CY Lin, S Nadjm-Tehrani - Proceedings of the 4th ACM Workshop on …, 2018 - dl.acm.org
The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …
Graph-based IoT microservice security
The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of
Microservices (μS). The μSs inherently process data that affects the privacy, safety, and …
Microservices (μS). The μSs inherently process data that affects the privacy, safety, and …
Timing-based anomaly detection in SCADA networks
Abstract Supervisory Control and Data Acquisition (SCADA) systems that operate our critical
infrastructures are subject to increased cyber attacks. Due to the use of request-response …
infrastructures are subject to increased cyber attacks. Due to the use of request-response …
Methodology to determine the device-level periodicity for anomaly detection in EtherCAT-based industrial control network
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure
their sustainability and security. To achieve these, industrial control system (ICS) networks …
their sustainability and security. To achieve these, industrial control system (ICS) networks …
An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems
Since the beginning of the 21th century, Industrial Control Systems (ICS) have been targeted
by hackers. The main motives for the interest to ICS is the ease for performing cyberattacks …
by hackers. The main motives for the interest to ICS is the ease for performing cyberattacks …