A survey on industrial control system testbeds and datasets for security research

M Conti, D Donadel, F Turrin - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs)
open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore …

[HTML][HTML] Security of smart manufacturing systems

N Tuptuk, S Hailes - Journal of manufacturing systems, 2018 - Elsevier
A revolution in manufacturing systems is underway: substantial recent investment has been
directed towards the development of smart manufacturing systems that are able to respond …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - kangkookjee.io
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

A Systematic Literature Review on RAMS analysis for critical infrastructures protection

S Pirbhulal, V Gkioulos, S Katsikas - International Journal of Critical …, 2021 - Elsevier
Abstract Reliability, Availability, Maintainability, and Safety/Security (RAMS) analysis of
Critical Infrastructures (CIs) can be applied to investigate their performance subjected to …

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman - Ad Hoc Networks, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …

Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks

C Feng, T Li, D Chana - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …

Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security

A Derhab, M Guerroumi, A Gumaei, L Maglaras… - Sensors, 2019 - mdpi.com
The industrial control systems are facing an increasing number of sophisticated cyber
attacks that can have very dangerous consequences on humans and their environments. In …

A survey of intrusion detection on industrial control systems

Y Hu, A Yang, H Li, Y Sun… - International Journal of …, 2018 - journals.sagepub.com
The modern industrial control systems now exhibit an increasing connectivity to the
corporate Internet technology networks so as to make full use of the rich resource on the …

Towards security-aware virtual environments for digital twins

M Eckhart, A Ekelhart - Proceedings of the 4th ACM workshop on cyber …, 2018 - dl.acm.org
Digital twins open up new possibilities in terms of monitoring, simulating, optimizing and
predicting the state of cyber-physical systems (CPSs). Furthermore, we argue that a fully …

Anomaly-based intrusion detection in industrial data with SVM and random forests

SDD Anton, S Sinha… - … International conference on …, 2019 - ieeexplore.ieee.org
Attacks on industrial enterprises are increasing in number as well as in effect. Since the
introduction of industrial control systems in the 1970's, industrial networks have been the …