Forget the myth of the air gap: Machine learning for reliable intrusion detection in SCADA systems

RL Perez, F Adamsky, R Soua… - … Transactions on Security …, 2019 - publications.eai.eu
… we detail different intrusion detection approaches for SCADA systems using real data sets.
The authors of [46] combine the signature-based and model-based approaches to design a …

air-jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (ir)

M Guri, D Bykhovsky - Computers & Security, 2019 - Elsevier
… Internet attacks by using firewalls, intrusion detection systems (IDSs) and intrusion prevention
systems (IPSs). For a higher degree of protection, so-called ‘air-gap’ isolation is used. In …

If air-gap attacks encounter the mimic defense

W Zhu, Y Liu, Y Fan, Y Liu, R Liu - 2019 9th International …, 2019 - ieeexplore.ieee.org
… However, the probability of successful attack is still less than 0.01 even if the mimic defense
is not turned on, which demonstrates the role of intrusion detection algorithm. In summary, …

Usbculprit: Usb-borne air-gap malware

M Guri - Proceedings of the 2021 European Interdisciplinary …, 2021 - dl.acm.org
… This behavior can be used as red flags for the AVs and intrusion detection systems. The
monitoring can be done at the file system level (eg, using file system filter driver in Windows OS) …

HVACKer: Bridging the air-gap by attacking the air conditioning system

Y Mirsky, M Guri, Y Elovici - arXiv preprint arXiv:1703.10454, 2017 - arxiv.org
… Although traffic within the isolated network may raise alarms of an intrusion detection
system (IDS) [33], a botnet within an organization can go undetected if the traffic is shaped …

Mind The Gap: Can Air-Gaps Keep Your Private Data Secure?

M Guri - arXiv preprint arXiv:2409.04190, 2024 - arxiv.org
… This includes using intrusion detection systems (IDS), network traffic analysis, anomaly detection
algorithms, and physical sensors. However, previous work showed that signal …

Industrial control system network intrusion detection by telemetry analysis

S Ponomarev, T Atkison - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
… Before wide adoption of the Internet, ICSs used “airgap” security measures, where every
node of an ICS network was isolated from other networks, including the Internet, by a physical …

Exfiltrating data from air-gapped computers via ViBrAtIoNs

M Guri - Future Generation Computer Systems, 2021 - Elsevier
Air-gap covert channels are special types of covert communication channels that enable
attackers to exfiltrate data from isolated, network-less computers. Various types of air-gapAiR-…

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
… step, which we term the semantic gap. Unfortunately, in the intrusion detection community
we find a tendency to limit the evaluation of anomaly detection systems to an assessment of a …

Air-fi: Leaking data from air-gapped computers using wi-fi frequencies

M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
air gap to adjacent networks, even across government organizations [7]. Other sophisticated
malware capable of compromising air-… intrusion detection systems can monitor the activity of …