2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA) 2018
DOI: 10.1109/etfa.2018.8502495
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective

Abstract: Industrial Control systems traditionally achieved security by using isolation from the outside and proprietary protocols to communicate inside. This paradigm is changed with the advent of the Industrial Internet of Things that foresees flexible and interconnected systems. In this contribution, the threats coming from this new approach are analyzed and a framework for identify them is proposed. It is based on the common signature based intrusion detection system developed in the information technology domain, h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Due to this integration, ICSs have introduced new types of vulnerabilities, and attacks on these weaknesses may cause anomalous behaviour. There are various data sources in ICS networks that can be monitored for anomaly detection [15,16]. Different methods have been published for anomaly detection in a single source of ICS data [17,22,27].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Due to this integration, ICSs have introduced new types of vulnerabilities, and attacks on these weaknesses may cause anomalous behaviour. There are various data sources in ICS networks that can be monitored for anomaly detection [15,16]. Different methods have been published for anomaly detection in a single source of ICS data [17,22,27].…”
Section: Background and Related Workmentioning
confidence: 99%