2016 Resilience Week (RWS) 2016
DOI: 10.1109/rweek.2016.7573322
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Anomaly Detection techniques for SCADA communication resilience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 11 publications
0
25
0
1
Order By: Relevance
“…But, their ability in detecting anomalies is still considerably lower than ours. The other four models have relatively poor performance mainly [52], but we notice that the precision, recall and F1-score do not match for the PCA-SVD model). We also depict the detected ratio (recall) of anomalous packages in each attack type by all models in Table V.…”
Section: Comparison With Other Anomaly Detection Modelsmentioning
confidence: 87%
See 1 more Smart Citation
“…But, their ability in detecting anomalies is still considerably lower than ours. The other four models have relatively poor performance mainly [52], but we notice that the precision, recall and F1-score do not match for the PCA-SVD model). We also depict the detected ratio (recall) of anomalous packages in each attack type by all models in Table V.…”
Section: Comparison With Other Anomaly Detection Modelsmentioning
confidence: 87%
“…Furthermore, we also compare the results with two unsupervised models (where training dataset contains anomalies but whether a package is normal or abnormal is not labelled) which are a Gaussian Mixture Model (GMM) and a Principal Component Analysis with Singular Value Decomposition model (PCA-SVD) that are directly taken from [52] since the authors have already used them for anomaly detection on the same gas pipeline dataset.…”
Section: Comparison With Other Anomaly Detection Modelsmentioning
confidence: 99%
“…Researchers in [4][5][6][7][8][9] find interesting functional and algorithmic solutions for the resilience of SCADA system that has suffered from a cyberattack. In [5], the authors consider three types of FDI (Fault Data Integrity) attacks on SCADA ( Fig.1): 1) on a separate sensor; 2) on a communication channel; 3) on a real-time database, and suggest the ways to enhance the SCADA resilience by creating a protective system of cyber-physical (CP) agents.…”
Section: Scada Cyber Resiliencementioning
confidence: 99%
“…Therefore, the requirements for processing the data subject to cyberattacks are increasing. For example, in [8] the authors consider new algorithms for solving the cyber resilience problem:  A resilience control algorithm that provides protection at the level of control system by increasing the application security;  Algorithms for resistance to intrusion and detection of anomalies that can classify measurements and commands into good and bad in the sense of their application;  Protection algorithms, that take into account the attacker's knowledge about the network functioning;  Smart Grid control algorithms that are capable to maintain the system within stability limits during an emergency (the most critical to cyberattacks).…”
Section: Scada Cyber Resiliencementioning
confidence: 99%
“…Methods of machine learning usually reduce the problem of ICS intrusion detection to one of standard tasks of machine learning, namely, classification, clustering, or detection of anomalies. The results of applying some classical machine learning algorithms (K-means, Naive Bayesian, GMM, PCA-SVD) are presented in [9] using the example of the Gas Pipeline dataset. Fully connected evolutionary based neural networks are used in [10] to detect anomalies.…”
Section: Introductionmentioning
confidence: 99%