Anomaly detection for industrial control system based on autoencoder neural network
C Wang, B Wang, H Liu, H Qu - Wireless Communications and …, 2020 - Wiley Online Library
As the Industrial Internet of Things (IIoT) develops rapidly, cloud computing and fog
computing become effective measures to solve some problems, eg, limited computing …
computing become effective measures to solve some problems, eg, limited computing …
[PDF][PDF] A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.
A common method: build a predictive model, eg, AR, LDS, RNN models: x (t)= f (x {t− p: t− 1},
u {t− p: t− 1}; θ)► x {t− p: t− 1} the sensor measurements from time t− p to t− 1► u {t− p: t− 1} …
u {t− p: t− 1}; θ)► x {t− p: t− 1} the sensor measurements from time t− p to t− 1► u {t− p: t− 1} …
Network intrusion detection system for DDoS attacks in ICS using deep autoencoders
Anomaly detection in industrial control and cyber-physical systems has gained much
attention over the past years due to the increasing modernisation and exposure of industrial …
attention over the past years due to the increasing modernisation and exposure of industrial …
A brief survey of security approaches for cyber-physical systems
E Bou-Harb - 2016 8th IFIP International Conference on New …, 2016 - ieeexplore.ieee.org
The security of Cyber-Physical Systems (CPS) has been recently receiving significant
attention from the research community. To this end, this paper sheds the light on a number of …
attention from the research community. To this end, this paper sheds the light on a number of …
Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber–physical systems
W Hao, T Yang, Q Yang - IEEE Transactions on Automation …, 2021 - ieeexplore.ieee.org
Critical industrial infrastructures are currently facing increasing cyberspace threats in their
underlying information and communication systems. The advanced monitoring, control, and …
underlying information and communication systems. The advanced monitoring, control, and …
IPAL: breaking up silos of protocol-dependent and domain-specific industrial intrusion detection systems
The increasing interconnection of industrial networks exposes them to an ever-growing risk
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
of cyber attacks. To reveal such attacks early and prevent any damage, industrial intrusion …
[PDF][PDF] Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Although the security of Cyber-Physical Systems (CPS) has been recently receiving
significant attention from the research community, undoubtedly, there still exists a substantial …
significant attention from the research community, undoubtedly, there still exists a substantial …
Design of efficient based artificial intelligence approaches for sustainable of cyber security in smart industrial control system
A Alzahrani, THH Aldhyani - Sustainability, 2023 - mdpi.com
Online food security and industrial environments and sustainability-related industries are
highly confidential and in urgent need for network traffic analysis to attain proper security …
highly confidential and in urgent need for network traffic analysis to attain proper security …
Cloud-edge coordinated traffic anomaly detection for industrial cyber-physical systems
T Yang, W Hao, Q Yang, W Wang - Expert Systems with Applications, 2023 - Elsevier
Industrial cyber-physical systems (ICPSs) are facing increasing cyber threats that can cause
catastrophes in the physical systems. Efficient network traffic anomaly detection is essential …
catastrophes in the physical systems. Efficient network traffic anomaly detection is essential …
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant
Abstract Industrial Control Systems (ICS) are found in critical infrastructure, such as, water
treatment plants and oil refineries. ICS are often the target of cyber-attacks leading to …
treatment plants and oil refineries. ICS are often the target of cyber-attacks leading to …