2021
DOI: 10.1007/s00170-021-08001-6
|View full text |Cite
|
Sign up to set email alerts
|

Automated detection-in-depth in industrial control systems

Abstract: Legacy industrial control systems (ICSs) are not designed to be exposed to the Internet and linking them to corporate networks has introduced a large number of cyber security vulnerabilities. Due to the distributed nature of ICS devices, a detection-in-depth strategy is required to simultaneously monitor the behaviour of multiple sources of ICS data. While a detection-in-depth method leads to detecting attacks, like flooding attacks in earlier phases before the attacker can reach the end target, most research … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 45 publications
(64 reference statements)
0
14
0
1
Order By: Relevance
“…In formulas (3) and ( 4), X, Y ∈ fA, B, Cg, X ≠ Y, I R * ABC,X , and I R * ABC,Y are the averages of vectors I R * ABC,X and I R * ABC,Y , respectively. If none of the column vectors I A , I B , and I C has the same value, the value of I R * ABC will be an integer [9]. Equation ( 4) can be simplified as…”
Section: Anomaly Data Collection Detection Model Using Tmentioning
confidence: 99%
See 1 more Smart Citation
“…In formulas (3) and ( 4), X, Y ∈ fA, B, Cg, X ≠ Y, I R * ABC,X , and I R * ABC,Y are the averages of vectors I R * ABC,X and I R * ABC,Y , respectively. If none of the column vectors I A , I B , and I C has the same value, the value of I R * ABC will be an integer [9]. Equation ( 4) can be simplified as…”
Section: Anomaly Data Collection Detection Model Using Tmentioning
confidence: 99%
“…In equations ( 9) and (10), n is the degree of freedom of the t distribution. The t distribution probability density function is used to determine the thresholds for hypothesis testing of the t statistics shown in Figure 2; i.e., t α ðN − 2Þ is the threshold with significance level equal to α and degrees of freedom equal to N − 2, which can be derived from equation (9). ð +∞…”
Section: Anomaly Data Collection Detection Model Using Tmentioning
confidence: 99%
“…Jadidi et al [29] proposed a multi-layer anomaly detector known as AFAD. The system was made up of two main parts: a lightweight network-based anomaly detector using hierarchical cluster analysis on Netflow data and a physical anomaly detector using an Autoregressive Integrated Moving Average (ARIMA)/Generalized AutoRegressive Conditional Heteroskedasticity (GARCH) predictor for time-series forecasting of sensor readings.…”
Section: Related Workmentioning
confidence: 99%
“…Other automated solutions have utilised the MITRE framework to perform threat hunting and detect APTs. For instance, [2] and [24] employed MITRE ATT&CK for Enterprise to detect threats. Proposal [24] further used statistical analysis based on MITRE ATT&CK to learn APT TTPs to predict the future techniques that the adversary may perform.…”
Section: Related Workmentioning
confidence: 99%
“…An ICS adversary often practices different actions to exploit these vulnerabilities, pass the border between Information Technology (IT) and Operational Technology (OT) networks and launch a targeted attack against ICS networks. Many organisations use cyber threat hunting to detect hidden intrusions before they cause a significant breach proactively [2]. Hunting aims to detect threat actors early in the cyber kill chain by searching for signs of an intrusion and then providing hunting strategies for future use [3].…”
Section: Introductionmentioning
confidence: 99%