Detection of Cyber-attacks with Zone Dividing and PCA

@inproceedings{Morita2013DetectionOC,
  title={Detection of Cyber-attacks with Zone Dividing and PCA},
  author={Takahito Morita and Shuichi Yogo and Masato Koike and Takashi Hamaguchi and Sun-Dong Jung and Ichiro Koshijima and Yoshihiro Hashimoto},
  booktitle={KES},
  year={2013}
}
Abstract Recently cyber-attacks become serious threats even for control systems. For process control, not only security but also safety must be assured. For safety assurance, the effects of cyber-attacks such as concealed remote operation and maneuvering must be evaluated. We proposed a securing method to divide field networks into plural zones. Even when a zone is intruded and attacks are concealed, the effects appear in other zones. In this paper, an automatic cyber-attacks detection system… Expand
Strategic security protection for industrial control systems
Even though serious accidents such as explosion or leakage of poisonous substances have not occurred yet, several cyber-attacks, e.g. Stuxnet, Havex and etc. have been developed to attack industrialExpand
Fishy Cyber Attack Detection in Industrial Control Systems
TLDR
A new automated approach based on Long Short Term Memory networks capable of detecting attacks and pin point the location of the breach is proposed, which will simulate a simple Water plant. Expand
Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems
TLDR
An anomaly detection approach based on zone partition is designed for ICPSs and presents a high-accuracy solution, which also performs effectively in real time. Expand
A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
TLDR
A software-defined security (SDSec) approach is presented that consists of a hybrid anomaly detection module and a multi-level security response module, both of which work together to secure the ICS field zones. Expand
Unsupervised Learning Based Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix
TLDR
A robust multivariate intrusion detection system called RAD for detecting attacks in the cyber-physical systems in O(d) space and time complexity, where d is the number parameters in the system state vector. Expand
Machine learning in cybersecurity: A review
TLDR
In this review, several areas of cybersecurity where machine learning is used as a tool are discussed and a few glimpses of adversarial attacks on machine learning algorithms to manipulate training and test data of classifiers, to render such tools ineffective are provided. Expand
Loughborough University Institutional Repository Anomaly detection based on zone partition for security protection of industrial cyber-physical systems
Integrating the cyber domain and physical domain for the flexibility and efficiency of supervision, management and control is the development tendency of traditional industrial systems. But, with theExpand
A fallback control study of networked control systems for cybersecurity
TLDR
A cybersecurity technology of networked control systems in terms of availability is considered, which consists of the remote controller and the local controller, which aims to prevent the spread of the damage caused by the infection of the computer malwares. Expand
Fishy Cyber A ack Detection in Industrial Control Systems An approach based on sequence learning LSTM networks
Cyber aŠacks have become serious threats to Industrial Control systems as well. It becomes important to develop a serious threat defense system against such vulnerabilities. For such process controlExpand
Security enhancements of networked control systems using RSA public-key cryptosystem
TLDR
The method proposed in this study uses the homomorphism of the RSA cryptosystem to determine control signals directly from encrypted feedback signals and control parameters without performing any decryption processes. Expand
...
1
2
...

References

SHOWING 1-4 OF 4 REFERENCES
Safety securing approach against cyber-attacks for process control system
TLDR
A new protection approach using an information system securing technique called “zones and conduits” to process control and dividing the control system network into plural zones means higher possibility of detecting cyber-attacks and preventing operational accidents can be achieved. Expand
Conceptual Framework for Security Hazard Management in Critical Infrastructures
Abstract In this paper, the security improvement approaches for process plant instrumentation and process information systems are proposed. By dividing control and information systems into pluralExpand
Risk analysis and countermeasure planning against cyber-attacks
  • J. of Human Factors in Japan,
  • 2011
SCADA system and cyber security
  • J. of Human Factors in Japan,
  • 2011