Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based detectors operate on the measured sensor data, leveraging physical process models learned a priori. In this work, we investigate different approaches to evade prior-work reconstruction-based anomaly detectors by manipulating sensor data so that the attack is concealed. We find that replay attacks (commonly assumed to be very strong) show bad performance (i.e., increasing the number of alarms) if the attacker is constrained to manipulate less than 95% of all features in the system, as hidden correlatio...
Critical infrastructure, such as water treatment facilities, largely relies on the effective functio...
Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to det...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect at...
In recent years, a number of model-free process-based anomaly detection schemes for Industrial Contr...
Deep Neural Networks are emerging as effective techniques to detect sophisticated cyber-attacks targ...
Recently, neural networks (NNs) have been proposed for the detection of cyber attacks targeting indu...
With the rise of advanced persistent threats to cyber-physical facilities, new methods for anomaly d...
Neural networks are increasingly used for intrusion detection on industrial control systems (ICS). W...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Recently, neural network (NN)-based methods, including autoencoders, have been proposed for the dete...
A variety of Intrusion Detection Systems (IDSs) for Industrial Control Systems have been proposed to...
Heterogeneous cyberattacks against industrial control systems (ICSs) have had a strong impact on the...
Industrial Control Systems (ICS) collect information from a variety of sensors throughout the proces...
In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-p...
Critical infrastructure, such as water treatment facilities, largely relies on the effective functio...
Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to det...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect at...
In recent years, a number of model-free process-based anomaly detection schemes for Industrial Contr...
Deep Neural Networks are emerging as effective techniques to detect sophisticated cyber-attacks targ...
Recently, neural networks (NNs) have been proposed for the detection of cyber attacks targeting indu...
With the rise of advanced persistent threats to cyber-physical facilities, new methods for anomaly d...
Neural networks are increasingly used for intrusion detection on industrial control systems (ICS). W...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Recently, neural network (NN)-based methods, including autoencoders, have been proposed for the dete...
A variety of Intrusion Detection Systems (IDSs) for Industrial Control Systems have been proposed to...
Heterogeneous cyberattacks against industrial control systems (ICSs) have had a strong impact on the...
Industrial Control Systems (ICS) collect information from a variety of sensors throughout the proces...
In robotic systems, the physical world is highly coupled with cyberspace. New threats affect cyber-p...
Critical infrastructure, such as water treatment facilities, largely relies on the effective functio...
Anomaly Detection systems based on Machine and Deep learning are the most promising solutions to det...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...