Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems

IA Khan, M Keshk, D Pi, N Khan, Y Hussain, H Soliman - Ad Hoc Networks, 2022 - Elsevier
Abstract Industrial Internet of Things (IIoT) networks involves heterogeneous technological
and manufacturing services and devices. The communication and data exchange …

Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks

C Feng, T Li, D Chana - 2017 47th Annual IEEE/IFIP …, 2017 - ieeexplore.ieee.org
We outline an anomaly detection method for industrial control systems (ICS) that combines
the analysis of network package contents that are transacted between ICS nodes and their …

HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems

IA Khan, D Pi, ZU Khan, Y Hussain, A Nawaz - IEEE Access, 2019 - ieeexplore.ieee.org
Critical infrastructures, eg, electricity generation and dispersal networks, chemical
processing plants, and gas distribution, are governed and monitored by supervisory control …

Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

[HTML][HTML] Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies

M Barrère, C Hankin, N Nicolaou, DG Eliades… - Journal of information …, 2020 - Elsevier
Abstract In recent years, Industrial Control Systems (ICS) have become increasingly
exposed to a wide range of cyber-physical attacks, having massive destructive …

A hypergraph based Kohonen map for detecting intrusions over cyber–physical systems traffic

SS Jagtap, SS VS, V Subramaniyaswamy - Future Generation Computer …, 2021 - Elsevier
Abstract Cyber–Physical System acts as a cornerstone in Industry 4.0 by integrating
information-technology, electrical, and mechanical engineering under the same crown. This …

Unknown vulnerability risk assessment based on directed graph models: a survey

W He, H Li, J Li - IEEE Access, 2019 - ieeexplore.ieee.org
Nowadays, vulnerability attacks occur frequently. Due to the information asymmetry between
attackers and defenders, vulnerabilities can be divided into known and unknown. Existing …

Blockchain-Enhanced Framework for Secure Third-Party Vendor Risk Management and Vigilant Security Controls

D Gupta, L Elluri, A Jain, SS Moni, O Aslan - arXiv preprint arXiv …, 2024 - arxiv.org
In an era of heightened digital interconnectedness, businesses increasingly rely on third-
party vendors to enhance their operational capabilities. However, this growing dependency …

Super detector: An ensemble approach for anomaly detection in industrial control systems

M Balaji, S Shrivastava, S Adepu, A Mathur - … Infrastructures Security: 16th …, 2021 - Springer
Abstract Industrial Control Systems encompass supervisory systems (SCADA) and cyber-
physical components (sensors/actuators), which are typically deployed in critical …

Scalable approach to enhancing ICS resilience by network diversity

T Li, C Feng, C Hankin - 2020 50th Annual IEEE/IFIP …, 2020 - ieeexplore.ieee.org
Network diversity has been widely recognized as an effective defense strategy to mitigate
the spread of malware. Optimally diversifying network resources can improve the resilience …