Scaphy: Detecting modern ics attacks by correlating behaviors in scada and physical

M Ike, K Phan, K Sadoski, R Valme… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Modern Industrial Control Systems (ICS) attacks evade existing tools by using knowledge of
ICS processes to blend their activities with benign Supervisory Control and Data Acquisition …

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

N Li, M Zhang, J Li, S Adepu, E Kang, Z Jin - ACM Transactions on …, 2024 - dl.acm.org
Security attacks present unique challenges to the design of self-adaptation mechanism for
software-intensive systems due to the adversarial nature of the environment. Game …

Super detector: An ensemble approach for anomaly detection in industrial control systems

M Balaji, S Shrivastava, S Adepu, A Mathur - … Infrastructures Security: 16th …, 2021 - Springer
Abstract Industrial Control Systems encompass supervisory systems (SCADA) and cyber-
physical components (sensors/actuators), which are typically deployed in critical …

Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process Attacks

M Ike, K Phan, A Badapanda, M Landen… - arXiv preprint arXiv …, 2023 - arxiv.org
Modern industrial control systems (ICS) attacks infect supervisory control and data
acquisition (SCADA) hosts to stealthily alter industrial processes, causing damage. To detect …

Anomaly Detection In Telecommunication Networks: Leveraging Novel Big Data And Machine Learning Techniques For Proactive Fault Management

SAA Ali - Educational Administration: Theory and Practice, 2024 - kuey.net
The telecommunication industry has experienced exponential growth, leading to complex
and intricate networks designed to support the ever-increasing demands of a hyper …

Industrial control malicious traffic anomaly detection system based on deep autoencoder

W Wang, C Wang, Y Guo, M Yuan, X Luo… - Frontiers in Energy …, 2021 - frontiersin.org
Industrial control network is a direct interface between information system and physical
control process. Due to the lack of authentication, encryption, and other necessary security …

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

M Zhang, N Li, S Adepu, E Kang, Z Jin - arXiv preprint arXiv:2112.07588, 2021 - arxiv.org
The increasing prevalence of security attacks on software-intensive systems calls for new,
effective methods for detecting and responding to these attacks. As one promising approach …

Industrial Control Malicious Traffic Anomaly Detection System Based on Deep Autoencoder

X Luo, Y Gao - Engineering Applications of Neurocomputing, 2022 - books.google.com
Industrial Control Malicious Traffic Anomaly Detection System Based on Deep Autoencoder
Page 104 ORIGINAL RESEARCH published: 19 January 2021 doi: 10.3389/fenrg. 2020.555145 …

Analysis and Detection of Unauthorized Access Points Using various Machine Learning Algorithms

AM Juwale - 2020 - norma.ncirl.ie
Illegal access points in an internet network is a frequent concern for users connected to the
network, in this paper, we try to identify the illegal access point entries via RTT Round Trip …