The continuous operation of an industrial process, such as water treatment or power generation, is governed by an Industrial Control System (ICS). Cyber attacks on industrial networks are of growing concern because of the disruption they can cause, leading to loss of revenue, and the possibility of harm to workers, plant and surroundings. Operators therefore need a Network Intrusion Detection System (NIDS) to analyse industrial network traffic in real time for adversarial behaviour. Machine Learning (ML) is applicable to the problem of network intrusion detection. This paper investigates the possibility of training an ML-based NIDS for an ICS (specifically, the well-known Secure Water Treatment testbed) by combining network traffic data and...
Abstract Gradual increase in the number of successful attacks against Industrial Control Systems (IC...
International audienceIndustrial control systems are subject to cyber attacks becoming more frequent...
Abstract: Gradual increase in the number of successful attacks against Industrial Control Systems (I...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
An intrusion detection system (IDS) is a software application that monitors a network forunauthorize...
An intrusion detection system (IDS) is a software application that monitors a network forunauthorize...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions....
Abstract Gradual increase in the number of successful attacks against Industrial Control Systems (IC...
International audienceIndustrial control systems are subject to cyber attacks becoming more frequent...
Abstract: Gradual increase in the number of successful attacks against Industrial Control Systems (I...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
The continuous operation of an industrial process, such as water treatment or power generation, is g...
Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and a...
An intrusion detection system (IDS) is a software application that monitors a network forunauthorize...
An intrusion detection system (IDS) is a software application that monitors a network forunauthorize...
The cyber-physical security of Industrial Control Systems (ICSs) represents an actual and worthwhile...
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions....
Abstract Gradual increase in the number of successful attacks against Industrial Control Systems (IC...
International audienceIndustrial control systems are subject to cyber attacks becoming more frequent...
Abstract: Gradual increase in the number of successful attacks against Industrial Control Systems (I...