Timing patterns and correlations in spontaneous {SCADA} traffic for anomaly detection

CY Lin, S Nadjm-Tehrani - 22nd international symposium on research in …, 2019 - usenix.org
Supervisory Control and Data Acquisition (SCADA) systems operate critical infrastructures in
our modern society despite their vulnerability to attacks and misuse. There are several …

A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments

W Aoudi, M Almgren - International journal of critical infrastructure …, 2020 - Elsevier
Advanced sensing is a key ingredient for intelligent control in Industrial Internet of Things
(IIoT) environments. Coupled with enhanced communication capabilities, sensors are …

Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends

M Iturbe, I Garitano, U Zurutuza… - Security and …, 2017 - Wiley Online Library
Industrial Networks (INs) are widespread environments where heterogeneous devices
collaborate to control and monitor physical processes. Some of the controlled processes …

Process-aware cyberattacks for thermal desalination plants

PHN Rajput, P Rajput, M Sazos… - Proceedings of the 2019 …, 2019 - dl.acm.org
In 2017, desalination industry was contracted to produce 99.8 million m3/d of fresh water
globally. In regions with a natural shortage of fresh water, desalination contributes up to 70 …

[HTML][HTML] A comparative analysis of emulated and real iec-104 spontaneous traffic in power system networks

CY Lin, S Nadjm-Tehrani - … , CPS4CIP 2020, Guildford, UK, September 18 …, 2021 - Springer
Abstract Supervisory and Data Acquisition (SCADA) systems control and monitor modern
power networks. As attacks targeting SCADA systems are increasing, significant research is …

An enhanced multi-stage semantic attack against industrial control systems

Y Hu, Y Sun, Y Wang, Z Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Industrial Control Systems (ICS) play a very important role in national critical infrastructures.
However, the growing interaction between the modern ICS and the Internet has made ICS …

Vulnerability Assessments of Induction Machine-Based Multistage Rolling Mill System Under Sensor Integrity Attacks

K Hu, J Ye, W Song - IEEE Transactions on Industrial …, 2024 - ieeexplore.ieee.org
In this article, we provide vulnerability assessments for a multistage rolling mill system under
various sensor integrity attacks in response to the increasing cyber-attack threats in …

On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control

M Iturbe, J Camacho, I Garitano… - 2016 46th Annual …, 2016 - ieeexplore.ieee.org
Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As
such, anomaly detection has been an active research field to ensure CI normal operation …

Sensor data validation and abnormal behavior detection in the internet of things

H Sándor, B Genge, Z Szántó - 2017 16th RoEduNet …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) and its various application domains are radically changing the lives
of people, providing smart services which will ultimately constitute integral components of …

A Data-Driven Framework for Verified Detection of Replay Attacks on Industrial Control Systems

S Gargoum, N Yassaie… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper addresses data-driven replay attack detection on industrial control systems. The
primary challenge in detection lies in distinguishing replayed sensor measurements from …