4.8 Article

False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Distributed Attack Detection in a Water Treatment Plant: Method and Case Study

Sridhar Adepu et al.

Summary: This paper introduces a method called Distributed Attack Detection (DAD) for real-time detection of attacks that compromise plant actuators and sensors. The method detects attacks by identifying anomalies in the behavior of the physical process in the plant, and its effectiveness was experimentally verified in a water treatment plant.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Joint Optimization of Offloading Utility and Privacy for Edge Computing Enabled IoT

Xiaolong Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Reliable Data Aggregation in Internet of ViSAR Vehicles Using Chained Dual-Phase Adaptive Interpolation and Data Embedding

Mohammad Reza Khosravi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance

Arunabha Mukhopadhyay et al.

INFORMATION SYSTEMS FRONTIERS (2019)

Article Engineering, Industrial

A comparative analysis of security risk assessment methodologies for the chemical industry

Anita Matteini et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Article Computer Science, Theory & Methods

Efficient Intrusion Detection With Bloom Filtering in Controller Area Networks

Bogdan Groza et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Abnormal detection method of industrial control system based on behavior model

Song Zhanwei et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Cyber-attack detection in SCADA systems using temporal pattern recognition techniques

Meir Kalech

COMPUTERS & SECURITY (2019)

Article Computer Science, Theory & Methods

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

Xuhang Ying et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Electrical & Electronic

Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders

Jingyu Wang et al.

IEEE TRANSACTIONS ON SMART GRID (2019)

Article Computer Science, Theory & Methods

Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest

Saeed Ahmed et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Review Computer Science, Information Systems

IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

Francesca Meneghello et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators

Amir Ameli et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Interdisciplinary Applications

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

Shadi Aljawarneh et al.

JOURNAL OF COMPUTATIONAL SCIENCE (2018)

Article Computer Science, Information Systems

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles

Wenyuan Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

HYBRID-AUGMENTED DEVICE FINGERPRINTING FOR INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEM NETWORKS

Chao Shen et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks

Yanpeng Guan et al.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)

Article Computer Science, Theory & Methods

Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems

Ming Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Cyber-Physical Systems Security-A Survey

Abdulmalik Humayed et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis

Yi Huang et al.

IEEE SYSTEMS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

Industrial Control System Network Intrusion Detection by Telemetry Analysis

Stanislav Ponomarev et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Engineering, Electrical & Electronic

Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data

Bhavya Kailkhura et al.

IEEE SIGNAL PROCESSING LETTERS (2015)

Article Engineering, Electrical & Electronic

Distributed Bayesian Detection in the Presence of Byzantine Data

Bhavya Kailkhura et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2015)

Review Engineering, Industrial

A survey of approaches combining safety and security for industrial control systems

Siwar Kriaa et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2015)

Article Computer Science, Information Systems

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems

Noam Erez et al.

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2015)

Article Automation & Control Systems

Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation

Chunjie Zhou et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2015)

Article Computer Science, Information Systems

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

Abdulmohsen Almalawi et al.

COMPUTERS & SECURITY (2014)

Article Automation & Control Systems

Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

Kebina Manandhar et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)

Article Automation & Control Systems

Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models

Saurabh Amin et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2013)

Article Automation & Control Systems

Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks

Saurabh Amin et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2013)

Article Computer Science, Information Systems

Was Stuxnet an Act of War? Decoding a Cyberattack

David P. Fidler

IEEE SECURITY & PRIVACY (2011)

Proceedings Paper Computer Science, Information Systems

Modbus/DNP3 State-based Intrusion Detection System

Igor Nai Fovino et al.

2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2010)

Article Engineering, Electrical & Electronic

Anomaly intrusion detection method based on HMM

Y Qiao et al.

ELECTRONICS LETTERS (2002)