A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems
Abstract
Index Terms
- A Mechanism to Assess the Effectiveness Anomaly Detectors in Industrial Control Systems
Recommendations
Cyber In-security of Industrial Control Systems: A Societal Challenge
SAFECOMP 2015: Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products and services. Many of the CI services as well as other organizations use Industrial Control Systems ICS to monitor and control ...
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems
Highlights- Successfully evaded RNN-based anomaly detectors in real-world CPSs using a gradient-based adversarial attack.
AbstractThe threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated research into a multitude of attack detection mechanisms, including anomaly detectors based on neural network models. The effectiveness of ...
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferenceRecently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based ...
Comments
Information & Contributors
Information
Published In
Publisher
IOS Press
Netherlands
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in