Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJanuary 2024
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection
AbstractIndustrial Intrusion Detection Systems (IIDSs) play a critical role in safeguarding Industrial Control Systems (ICSs) against targeted cyberattacks. Unsupervised anomaly detectors, capable of learning the expected behavior of physical processes, ...
- research-articleOctober 2022
IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and DefensesPages 510–525https://doi.org/10.1145/3545948.3545968The increasing interconnection of industrial networks exposes them to an ever-growing risk of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion detection searches for anomalies in otherwise predictable ...
- ArticleSeptember 2022
Can Industrial Intrusion Detection Be SIMPLE?
AbstractCyberattacks against industrial control systems pose a serious risk to the safety of humans and the environment. Industrial intrusion detection systems oppose this threat by continuously monitoring industrial processes and alerting any deviations ...
- research-articleAugust 2022
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
CSET '22: Proceedings of the 15th Workshop on Cyber Security Experimentation and TestPages 49–53https://doi.org/10.1145/3546096.3546102Power grids worldwide are increasingly victims of cyberattacks, where attackers can cause immense damage to critical infrastructure. The growing digitalization and networking in power grids combined with insufficient protection against cyberattacks ...
- research-articleMay 2022
A False Sense of Security?: Revisiting the State of Machine Learning-Based Industrial Intrusion Detection
- Dominik Kus,
- Eric Wagner,
- Jan Pennekamp,
- Konrad Wolsing,
- Ina Berenice Fink,
- Markus Dahlmanns,
- Klaus Wehrle,
- Martin Henze
CPSS '22: Proceedings of the 8th ACM on Cyber-Physical System Security WorkshopPages 73–84https://doi.org/10.1145/3494107.3522773Anomaly-based intrusion detection promises to detect novel or unknown attacks on industrial control systems by modeling expected system behavior and raising corresponding alarms for any deviations. As manually creating these behavioral models is tedious ...
- posterNovember 2020
Facilitating Protocol-independent Industrial Intrusion Detection Systems
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 2105–2107https://doi.org/10.1145/3372297.3420019Cyber-physical systems are increasingly threatened by sophisticated attackers, also attacking the physical aspect of systems. Supplementing protective measures, industrial intrusion detection systems promise to detect such attacks. However, due to ...
- research-articleDecember 2019
Perceiving QUIC: do users notice or even care?
CoNEXT '19: Proceedings of the 15th International Conference on Emerging Networking Experiments And TechnologiesPages 144–150https://doi.org/10.1145/3359989.3365416QUIC, as the foundation for HTTP/3, is becoming an Internet reality. A plethora of studies already show that QUIC excels beyond TCP+ TLS+HTTP/2. Yet, these studies compare a highly optimized QUIC Web stack against an unoptimized TCP-based stack. In this ...
- research-articleJuly 2019
A performance perspective on web optimized protocol stacks: TCP+TLS+HTTP/2 vs. QUIC
ANRW '19: Proceedings of the 2019 Applied Networking Research WorkshopPages 1–7https://doi.org/10.1145/3340301.3341123Existing performance comparisons of QUIC and TCP compared an optimized QUIC to an unoptimized TCP stack. By neglecting available TCP improvements inherently included in QUIC, comparisons do not shed light on the performance of current web stacks. In this ...
- short-paperOctober 2018
Digging into Browser-based Crypto Mining
IMC '18: Proceedings of the Internet Measurement Conference 2018Pages 70–76https://doi.org/10.1145/3278532.3278539Mining is the foundation of blockchain-based cryptocurrencies such as Bitcoin rewarding the miner for finding blocks for new transactions. The Monero currency enables mining with standard hardware in contrast to special hardware (ASICs) as often used in ...