All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection

MO Pahl, FX Aubet - 2018 14th International Conference on …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is a Distributed System of cooperating Microservices (μSs). IoT
services manage devices that monitor and control their environments. The interaction of the …

[HTML][HTML] A novel bi-anomaly-based intrusion detection system approach for industry 4.0

S Alem, D Espes, L Nana, E Martin… - Future Generation …, 2023 - Elsevier
Abstract Today, industry 4.0 is becoming a major target for cybercriminals due to its hyper-
connectivity. Fortunately, there are several advanced means of securing industrial systems …

[HTML][HTML] Protocol study and anomaly detection for server-driven traffic in SCADA networks

CY Lin, S Nadjm-Tehrani - International Journal of Critical Infrastructure …, 2023 - Elsevier
Abstract Attacks against Supervisory Control and Data Acquisition (SCADA) systems
operating critical infrastructures have largely appeared in the past decades. There are …

Analysis of machine learning methods in EtherCAT-based anomaly detection

KO Akpinar, I Ozcelik - IEEE Access, 2019 - ieeexplore.ieee.org
Today, the use of Ethernet-based protocols in industrial control systems (ICS)
communications has led to the emergence of attacks based on information technology (IT) …

Scada world: An exploration of the diversity in power grid networks

N Ortiz, AA Cardenas, A Wool - … of the ACM on Measurement and …, 2024 - dl.acm.org
Despite a growing interest in understanding the industrial control networks that monitor and
control our critical infrastructures (such as the power grid), to date, SCADA networks have …

Understanding IEC-60870-5-104 traffic patterns in SCADA networks

CY Lin, S Nadjm-Tehrani - Proceedings of the 4th ACM Workshop on …, 2018 - dl.acm.org
The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …

Graph-based IoT microservice security

MO Pahl, FX Aubet, S Liebald - NOMS 2018-2018 IEEE/IFIP …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of
Microservices (μS). The μSs inherently process data that affects the privacy, safety, and …

Timing-based anomaly detection in SCADA networks

CY Lin, S Nadjm-Tehrani, M Asplund - … 2017, Lucca, Italy, October 8-13 …, 2018 - Springer
Abstract Supervisory Control and Data Acquisition (SCADA) systems that operate our critical
infrastructures are subject to increased cyber attacks. Due to the use of request-response …

Methodology to determine the device-level periodicity for anomaly detection in EtherCAT-based industrial control network

KO Akpinar, I Ozcelik - IEEE Transactions on Network and …, 2020 - ieeexplore.ieee.org
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure
their sustainability and security. To achieve these, industrial control system (ICS) networks …

An approach based on behavioral models and critical states distance notion for improving cybersecurity of industrial control systems

F Sicard, É Zamaï, JM Flaus - Reliability Engineering & System Safety, 2019 - Elsevier
Since the beginning of the 21th century, Industrial Control Systems (ICS) have been targeted
by hackers. The main motives for the interest to ICS is the ease for performing cyberattacks …