Fishy Cyber Attack Detection in Industrial Control Systems

12/09/2018
by   Manikanta Reddy, et al.
0

Cyber attacks have become serious threats to Industrial Control systems as well. It becomes important to develop a serious threat defense system against such vulnerabilities. For such process control systems, safety should also be assured apart from security. As unearthing vulnerabilities and patching them is not a feasible solution, these critical infrastructures need safeguards to prevent accidents, both natural and artificial, that could potentially be hazardous. Morita proposed an effective Zone division, capable of evaluating remote and concealed attacks on the system, coupled with Principal Component Analysis. But the need to analyze the node that has been compromised and stopping any further damages, requires an automated technique. Illustrating the basic ideas we'll simulate a simple Water plant. We propose a new automated approach based on Long Short Term Memory networks capable of detecting attacks and pin point the location of the breach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2020

Online Discoverability and Vulnerabilities of ICS/SCADA Devices in the Netherlands

On a regular basis, we read in the news about cyber-attacks on critical ...
research
06/10/2020

Evaluating the Exploitability of Implicit Interactions in Distributed Systems

Implicit interactions refer to those interactions among the components o...
research
01/25/2020

A Review of Cybersecurity Incidents in the Water Sector

This study presents a critical review of disclosed, documented, and mali...
research
09/13/2018

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems

A hackfest named SWaT Security Showdown (S3) has been organized consecut...
research
09/04/2019

ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems

Maintenance staff of Industrial Control Systems (ICS) is generally not a...
research
10/01/2020

BRON – Linking Attack Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations

Many public sources of cyber threat and vulnerability information exist ...
research
09/08/2021

Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures

Critical infrastructures (CI) and industrial organizations aggressively ...

Please sign up or login with your details

Forgot password? Click here to reset