attack and create attacks that deceive the anomaly detection methods in Industrial Control
System (ICS). Given that security assessment of an ICS demands that an exhaustive set of
possible attack patterns is studied, in this work, we propose an association rule mining-
based attack generation technique. The technique has been implemented using data from a
Secure Water Treatment plant. The proposed technique was able to generate more than …