Model based rules generation for Intrusion Detection System for industrial systems

MH Monzer, K Beydoun… - … Conference on Control …, 2019 - ieeexplore.ieee.org
The security of cyber-physical systems (CPS) is a major concern and intrusion detection
systems (IDS) are used to ensure this security. Model-based IDSs rely on the CPS model to …

Null is not always empty: Monitoring the null space for field-level anomaly detection in industrial IoT environments

E Zugasti, M Iturbe, I Garitano… - 2018 Global Internet of …, 2018 - ieeexplore.ieee.org
Industrial environments have vastly changed since the conception of initial primitive and
isolated networks. The current full interconnection paradigm, where connectivity between …

CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment

S Longari, A Pozone, J Leoni, M Polino… - … on Emerging Topics …, 2023 - ieeexplore.ieee.org
In the last decades, CPSs have experienced a significant technological evolution and
increased connectivity, at the cost of greater exposure to cyber-attacks. Since many CPS are …

[PDF][PDF] Developing of the cyber security system based on clustering and formation of control deviation signs

VA Lakhno, PU Kravchuk, VP Malyukov… - Journal of Theoretical …, 2017 - jatit.org
The cyber security (CS) adaptive system is developed. It is based on advanced algorithms of
anomalies signs space partitioning and attacks on clusters. A new approach of solving the …

Epasad: ellipsoid decision boundary based process-aware stealthy attack detector

V Maurya, R Agarwal, S Kumar, S Shukla - Cybersecurity, 2023 - Springer
Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been
lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical …

DRIVERS: A platform for dynamic risk assessment of emergent cyber threats for industrial control systems

M Nobili, C Fioravanti, S Guarino… - … on Control and …, 2023 - ieeexplore.ieee.org
A good cyber risk assessment is nowadays a matter of paramount importance for industrial
systems and critical infrastructures. In a radical change and continuous development …

Zero Trust Implementation in the Emerging Technologies Era: Survey

AI Weinberg, K Cohen - arXiv preprint arXiv:2401.09575, 2024 - arxiv.org
This paper presents a comprehensive analysis of the shift from the traditional perimeter
model of security to the Zero Trust (ZT) framework, emphasizing the key points in the …

Function‐Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication

M Wan, Y Song, Y Jing, J Wang - Security and Communication …, 2018 - Wiley Online Library
Function control, which is an essential link in industrial automation, is undergoing a growing
integration with ICTs (Information Communication Technologies) because of the flexible …

[PDF][PDF] Development of a system for the detection of cyber attacks based on the clustering and formation of reference deviations of attributes

V Lakhno, V Malyukov, V Domrachev… - Восточно …, 2017 - irbis-nbuv.gov.ua
Розроблено адаптивну систему виявлення кібератак, яка базується на удосконалених
алгоритмах розбиття простору ознак на кластери. Удосконалена процедура …

A comparative study of smart grid security based on unsupervised learning and load ranking

S Paul, MR Haq, A Das, Z Ni - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Due to the increasing number of risk factors, energy sector has been experiencing
interruptions (attack) in the normal operation both externally and internally. Different …