An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems

被引:3
|
作者
Qassim, Q. S. [1 ]
Ahmad, A. R. [1 ,2 ]
Ismail, R. [1 ,2 ]
Bakar, Abu A. [1 ,2 ]
Rahim, Abdul F. [1 ,2 ]
Mokhtar, M. Z. [1 ,2 ]
Ramli, R. [1 ,2 ]
Mohd, Yusof B. [1 ]
Mahdi, Mohammed Najah [1 ]
机构
[1] Univ Tenaga Nas, Inst Informat & Comp Energy, Kajang 43000, Malaysia
[2] Univ Tenaga Nas, Coll Comp & Informat, Kajang 43000, Malaysia
关键词
Intrusion Detection System; SCADA; Deception Attack; Machine Learning; Industrial Control Systems;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2019.00057
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works.
引用
收藏
页码:267 / 272
页数:6
相关论文
共 50 条
  • [1] Attacks on Industrial Control Systems Modeling and Anomaly Detection
    Eigner, Oliver
    Kreimel, Philipp
    Tavolato, Paul
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 581 - 588
  • [2] Detection and mitigation of deception attacks on cloud-based industrial control systems
    Akbarian, Fatemeh
    Tarneberg, William
    Fitzgerald, Emma
    Kihl, Maria
    [J]. 25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
  • [3] Active Synchronous Detection of Deception Attacks in Microgrid Control Systems
    Li, Yan
    Zhang, Peng
    Zhang, Liang
    Wang, Bing
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (01) : 373 - 375
  • [4] Detection of Deception Attacks on the Backward Channel of Networked Control Systems
    Pang Zhonghua
    Liu Guoping
    Zhou Donghua
    [J]. PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 5972 - 5977
  • [5] Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking
    Salimi, Somayeh
    Dey, Subhrakanti
    Ahlen, Anders
    [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 883 - 890
  • [6] Anomaly detection using isomorphic analysis for false data injection attacks in industrial control systems
    Zhang, Xinchen
    Jiang, Zhihan
    Ding, Yulong
    Ngai, Edith C. H.
    Yang, Shuang-Hua
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (13):
  • [7] Anomaly Detection Dataset for Industrial Control Systems
    Dehlaghi-Ghadim, Alireza
    Moghadam, Mahshid Helali
    Balador, Ali
    Hansson, Hans
    [J]. IEEE ACCESS, 2023, 11 : 107982 - 107996
  • [8] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    Zerdazi, I.
    Fezari, M.
    Ouziala, M.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (02) : 156 - 167
  • [9] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph
    I. Zerdazi
    M. Fezari
    M. Ouziala
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 156 - 167
  • [10] Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
    Erba, Alessandro
    Tippenhauer, Nils Ole
    [J]. PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 412 - 426