Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
The ICS-SEC KG: An Integrated Cybersecurity Resource for Industrial Control Systems
AbstractThe convergence of Information Technology (IT) and Operational Technology (OT) in Industrial Control System (ICS) comes with severe cybersecurity challenges that increasingly pose threats to critical infrastructures. In this challenging ...
- ArticleSeptember 2024
TabGAN-Powered Data Augmentation and Explainable Boosting-Based Ensemble Learning for Intrusion Detection in Industrial Control Systems
AbstractIn the era of Industry 4.0, the Industrial Control System (ICS) plays a crucial role, making the detection of cyber attacks on it both vital and challenging. This study presents TDAELID, a method designed to improve cyber assault detection on the ...
- research-articleJuly 2024
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 53, Pages 1–9https://doi.org/10.1145/3664476.3670875Industrial Control Systems (ICSs) are critical in automating and controlling industrial processes. Human errors within ICSs can significantly impact the system’s underlying processes and users’ safety. Thus, it is essential to understand the factors ...
- research-articleJuly 2024
CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 417–426https://doi.org/10.1145/3671016.3674812Industrial Control System (ICS) is vital to critical infrastructures, yet it faces increasing security threats. Current Intrusion Detection System (IDS) designed for ICS often overlooks the unbalanced resource distribution among devices at different ...
- short-paperJuly 2024
Keynote: Dissecting the software supply chain of modern industrial control systems
CPSS '24: Proceedings of the 10th ACM Cyber-Physical System Security WorkshopPage 2https://doi.org/10.1145/3626205.3664748Recent years have been pivotal in the field of Industrial Control Systems (ICS) security, with a large number of high-profile attacks exposing the lack of a design-for-security initiative in ICS. The evolution of ICS abstracting the control logic to a ...
-
- articleNovember 2023
Threat Attribution and Reasoning for Industrial Control System Asset
International Journal of Ambient Computing and Intelligence (IJACI-IGI), Volume 15, Issue 1Pages 1–27https://doi.org/10.4018/IJACI.333853Due to the widespread use of the industrial internet of things, the industrial control system has steadily transformed into an intelligent and informational one. To increase the industrial control system's security, based on industrial control system ...
- ArticleJune 2024
Evasion Attack Against Multivariate Singular Spectrum Analysis Based IDS
Critical Information Infrastructures SecurityPages 135–154https://doi.org/10.1007/978-3-031-62139-0_8AbstractMachine learning-based intrusion detection systems (IDS) are being developed to detect industrial control systems (ICS) attacks. Such IDSs monitor sensor measurements to detect abnormal structural changes in the behavior of physical dynamics of ...
- research-articleJuly 2023
Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks
CPSS '23: Proceedings of the 9th ACM Cyber-Physical System Security WorkshopPages 36–47https://doi.org/10.1145/3592538.3594271Industrial Control Systems (ICS) are responsible for the safety and operations of critical infrastructure such as power grids. Attacks on such systems threaten the well-being of societies, and the lives of human operators, and pose huge financial ...
- ArticleOctober 2023
Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems
Applied Cryptography and Network Security WorkshopsPages 299–320https://doi.org/10.1007/978-3-031-41181-6_17AbstractIndustrial Control Systems (ICSs) including those executing process safety controls, alarms, and interlocks are becoming more interconnected with other systems. Traditional process hazard analysis (PHA) rarely considered the possibility of cyber-...
- research-articleJanuary 2023
Proposal of Cyber Range for Control System based on Virtual Commissioning Technology
Procedia Computer Science (PROCS), Volume 225, Issue CPages 2892–2901https://doi.org/10.1016/j.procs.2023.10.282AbstractManufacturing companies are rapidly moving toward Digitalization. As a result, today's industrial systems integrate information systems and manufacturing systems. In this context, damage caused by cyber-attacks has become apparent, and cyber-...
- research-articleOctober 2022
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems
RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and DefensesPages 333–349https://doi.org/10.1145/3545948.3545954Cyber-physical industrial control systems (ICS) commonly implement configuration parameters that can be remotely tuned by human-machine interfaces (HMI) at runtime. These parameters directly control the behaviors of ICSs thus they can be exploited by ...
- research-articleNovember 2022
A Case Study of IIoT Application in Process Manufacturing: Management Information Systems in Palm Oil Refinery
ICONETSI '22: Proceedings of the 2022 International Conference on Engineering and Information Technology for Sustainable IndustryArticle No.: 45, Pages 1–6https://doi.org/10.1145/3557738.3557865Industrial Internet of Things (IIoT) is providing technology integration of Information Technology (IT) and Operation Technology (OT). While OT is related to operational in shop floor production, IT has become a backbone in corporate management ...
- articleJune 2022
A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology
International Journal of Digital Crime and Forensics (IJDCF), Volume 14, Issue 2Pages 1–20https://doi.org/10.4018/IJDCF.302874The Industrial Control System (ICS) has become the key concept in the modern industrial world, enabling process monitoring and system control for general industrial systems and critical infrastructures. High-skilled hackers can invade an imperfect ...
- research-articleSeptember 2021
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment
International Journal of Critical Infrastructure Protection (IJCIP), Volume 34, Issue Chttps://doi.org/10.1016/j.ijcip.2021.100446AbstractTechnology has become an integral part of contemporary society. The current transition from an industrial society to an information society is accompanied by the implementation of new technologies in every part of human activity. ...
- ArticleAugust 2021
Research on Improvement of Anomaly Detection Performance in Industrial Control Systems
AbstractIn the automated Industrial Control System (ICS) where advanced technology is being integrated with core infrastructure, technology development is ahead of the application of security solutions. Our city, power, and transportation control systems ...
- research-articleJuly 2021
Efficient Industrial Control Systems risk assessment using the attack path to the critical device
MSIE '21: Proceedings of the 2021 3rd International Conference on Management Science and Industrial EngineeringPages 104–110https://doi.org/10.1145/3460824.3460859In cyberattacks against Industrial Control Systems (ICS), one of the final goals of attackers is to impair ICS operations. Recent ICS tend to be connected with other networks and are often implemented with common technologies in order to increase ...
- short-paperSeptember 2021
Anomaly detection in time-series data environment
ACM ICEA '20: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging ApplicationsArticle No.: 30, Pages 1–3https://doi.org/10.1145/3440943.3444353Typical label data detect anomaly due to the relationship between inputs and labels, but time-series data are more demanding in detecting anomalies because they detect anomaly based on time-varying values. To solve this problem, this paper proposed ...
- research-articleDecember 2020
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
- Alessandro Erba,
- Riccardo Taormina,
- Stefano Galelli,
- Marcello Pogliani,
- Michele Carminati,
- Stefano Zanero,
- Nils Ole Tippenhauer
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 480–495https://doi.org/10.1145/3427228.3427660Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based ...
- ArticleSeptember 2020
A Microservice-Based Industrial Control System Architecture Using Cloud and MEC
- Yu Kaneko,
- Yuhei Yokoyama,
- Nobuyuki Monma,
- Yoshiki Terashima,
- Keiichi Teramoto,
- Takuya Kishimoto,
- Takeshi Saito
AbstractCloud computing has been adapted for various application areas. Several research projects are underway to migrate Industrial Control Systems (ICSs) to the public cloud. Some functions of ICSs require real-time processing that is difficult to ...
- ArticleMay 2020
Security Improvements by Separating the Cryptographic Protocol from the Network Stack onto a Multi-MCU Architecture
Architecture of Computing Systems – ARCS 2020Pages 185–199https://doi.org/10.1007/978-3-030-52794-5_14AbstractThe number of IoT devices in SCADA and ICS systems is rising quickly, especially in the domain of critical infrastructures. But these kinds of systems are performing mission critical tasks like controlling devices in industrial facilities or ...