Intrusion Detection Systems Trends to Counteract Growing Cyber-Attacks on Cyber-Physical Systems

J Ali - 2021 22nd International Arab Conference on …, 2021 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) suffer from extendable vulnerabilities due to the
convergence of the physical world with the cyber world, which makes it victim to a number of …

Designing an intrusion detection for an adjustable speed drive system controlling a critical process

FH Alotaibi, H Ibrahim, J Kim, PR Kumar… - IEEE Access, 2023 - ieeexplore.ieee.org
In this article, we address the cyber-security problem of industrial control systems (ICSs)
when their sensor measurements may be compromised due to an attacker who has …

Stealthy attack detection method based on Multi-feature long short-term memory prediction model

J Wang, Y Lai, J Liu - Future Generation Computer Systems, 2022 - Elsevier
Industrial control systems (ICS) face severe threats due to the inherent vulnerability of
shared networks. Among the attacks against ICS, stealthy attack is an attack behavior in …

NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing

H Wanyan, Y Lai, J Liu, H Chen - Computers & Security, 2024 - Elsevier
Industrial control systems (ICSs) have many vulnerabilities owing to the lack of protective
measures. Once exploited, such vulnerabilities can result in significant economic loss and …

工业控制系统关键组件安全风险综述

唐士杰, 袁方, 李俊, 丁勇, 王会勇 - 网络与信息安全学报, 2022 - infocomm-journal.com
随着现代信息技术与通信技术的快速发展, 工业控制(简称“工控”) 系统已经成为国家关键基础
设施的重要组成部分, 其安全性关系到国家的战略安全和社会稳定. 现代工控系统与互联网越来 …

[PDF][PDF] Compared insights on machine-learning anomaly detection for process control feature

M Wan, Q Li, J Yao, Y Song, Y Liu… - Computers, Materials & …, 2022 - cdn.techscience.cn
Anomaly detection is becoming increasingly significant in industrial cyber security, and
different machine-learning algorithms have been generally acknowledged as various …

Functional Pattern-Related Anomaly Detection Approach Collaborating Binary Segmentation with Finite State Machine.

J Li, Y Song - Computers, Materials & Continua, 2023 - search.ebscohost.com
The process control-oriented threat, which can exploit OT (Operational Technology)
vulnerabilities to forcibly insert abnormal control commands or status information, has …

Anomaly Detection Collaborating Adaptive CEEMDAN Feature Exploitation with Intelligent Optimizing Classification for IIoT Sparse Data

J Zhao, P Zeng, M Wan, X Xu, J Li… - … and Mobile Computing, 2021 - Wiley Online Library
IIoT (Industrial Internet of Things) has gained considerable attention and has been
increasingly applied due to its ubiquitous sensing and communication. However, the sparse …

On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication

J Zhao, P Zeng, Y Liu, T Wang - Security and Communication …, 2021 - Wiley Online Library
Mobile video communication and Internet of Things are playing a more and more important
role in our daily life. Mobile Edge Computing (MEC), as the essential network architecture for …

[PDF][PDF] Functional Pattern-Related Anomaly Detection Approach Collaborating Binary Segmentation with Finite State Machine

M Wan, M Hao, J Li, J Yao… - … MATERIALS & CONTINUA, 2023 - cdn.techscience.cn
The process control-oriented threat, which can exploit OT (Operational Technology)
vulnerabilities to forcibly insert abnormal control commands or status information, has …