Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses 2022
DOI: 10.1145/3545948.3545968
|View full text |Cite
|
Sign up to set email alerts
|

IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 73 publications
1
16
0
Order By: Relevance
“…While we shed light on these two dimensions, IIDSs can fall in between [80], i.e., making use of knowledge-based and behavior-based detection methodologies. This goes to show that not all IIDSs strictly follow the classification presented here and we refer the reader to other surveys which highlight the differences in greater depth [55,59,80,87].…”
Section: Comparisonmentioning
confidence: 53%
See 3 more Smart Citations
“…While we shed light on these two dimensions, IIDSs can fall in between [80], i.e., making use of knowledge-based and behavior-based detection methodologies. This goes to show that not all IIDSs strictly follow the classification presented here and we refer the reader to other surveys which highlight the differences in greater depth [55,59,80,87].…”
Section: Comparisonmentioning
confidence: 53%
“…Even though ICSs rely on researchers to design appropriate countermeasures and test their efficiency in real-world deployments, operators rarely provide such urgently-needed data samples [3,56,74]. While these challenges constitute an opportunity to tackle IIDS research from varying angles, transfer insights across industrial domains, and investigate their efficiency in real-world deployments, they likewise segregate the overall research landscape, resulting in isolated silos [87]. Consequently, sound scientific evaluations remain as the foundation to facilitate coherence and measure the overall progress of the research field.…”
Section: Challenges Of Evaluating Iidsmentioning
confidence: 99%
See 2 more Smart Citations
“…While recent research provides sophisticated approaches leveraging semantic and process knowledge, these approaches rarely find their way into practice, mainly due to their tight coupling to distinct industrial communication protocols and individual datasets. By leveraging commonalities found in industrial communication, our research lays a common ground for realizing widely applicable industrial intrusion detection systems (Wolsing et al 2022). Furthermore, state-of-the-art industrial intrusion detection systems typically rely on machine learning to detect anomalous behavior.…”
Section: Network Securitymentioning
confidence: 99%