2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2017
DOI: 10.1109/qrs-c.2017.29
|View full text |Cite
|
Sign up to set email alerts
|

Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…The limitation of the dataset used by reference [125] covering malicious IoT devices is the use of the CAIDA darknet datasets which predominantly contain malicious material. Based on the results, the research community appears to lean on software-based simulation using established platforms, predominantly Matlab [39,101,117,118,132], but researchers also utilise UPPAAL [118] and ProModel Process [39] simulators. Therefore, software-based simulations are a frequent choice to test experimental concepts.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The limitation of the dataset used by reference [125] covering malicious IoT devices is the use of the CAIDA darknet datasets which predominantly contain malicious material. Based on the results, the research community appears to lean on software-based simulation using established platforms, predominantly Matlab [39,101,117,118,132], but researchers also utilise UPPAAL [118] and ProModel Process [39] simulators. Therefore, software-based simulations are a frequent choice to test experimental concepts.…”
Section: Discussionmentioning
confidence: 99%
“…For example, a secure water treatment plant often consists of distributed cyber infrastructures that control physical processes. The author in reference [118] proposed a time automata (TA) approach, whilst another study [64] focused on a hybrid of machine learning combined with a specification-based detection. An orthogonal defence mechanism consisting of several intelligent checkers was used by the author in reference [51].…”
Section: Dfir Analysismentioning
confidence: 99%
“…The construction-specific threat modeling approach and vulnerability analysis presented in Mantha et al (2020a) and Mantha and García de Soto (2019) are pioneering examples in this direction and can be used as an inspiration for future research. In the green cluster, the publications focusing on the cybersecurity aspects of OT and CPSs (Duque Anton et al 2019;Zhang et al 2019;Adepu and Mathur 2018;Ahmed and Mathur 2017;Babu et al 2017;Khan et al 2017;Sugumar and Mathur 2017;Khorrami et al 2016;Kobara 2016;Schlegel et al 2015;Wang et al 2015;Yang and Zhao 2015) can shed light on similar problems in the construction phase even though the workplace dynamics are different from other sectors (Mantha et al 2020a).…”
Section: Green Cluster: Construction Automation and Cyber-physical Systemsmentioning
confidence: 99%
“…In addition, there has been related research on CPS intrusion detection. The detection methods include hostbased intrusion detection, which mainly monitors parts or activities of the host, network-based intrusion detection, vulnerability assessment-based intrusion detection including abuse/signature intrusion detection and anomaly-based intrusion detection, status protocol analysis, and process failure variables [21,22,23]. Most of the detection technologies analyze the network traffic from different perspectives to detect intrusions.…”
Section: Related Workmentioning
confidence: 99%