Publication: An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems
dc.citedby | 3 | |
dc.contributor.author | Qassim Q. | en_US |
dc.contributor.author | Ahmad A.R. | en_US |
dc.contributor.author | Ismail R. | en_US |
dc.contributor.author | Abu Bakar A. | en_US |
dc.contributor.author | Abdul Rahim F. | en_US |
dc.contributor.author | Mokhtar M.Z. | en_US |
dc.contributor.author | Ramli R. | en_US |
dc.contributor.author | Mohd Yusof B. | en_US |
dc.contributor.author | Mahdi M.N. | en_US |
dc.contributor.authorid | 36613541700 | en_US |
dc.contributor.authorid | 35589598800 | en_US |
dc.contributor.authorid | 15839357700 | en_US |
dc.contributor.authorid | 35178991300 | en_US |
dc.contributor.authorid | 57350579500 | en_US |
dc.contributor.authorid | 36544184200 | en_US |
dc.contributor.authorid | 57191413657 | en_US |
dc.contributor.authorid | 57215353012 | en_US |
dc.contributor.authorid | 56727803900 | en_US |
dc.date.accessioned | 2023-05-29T07:25:37Z | |
dc.date.available | 2023-05-29T07:25:37Z | |
dc.date.issued | 2019 | |
dc.description | Anomaly detection; Big data; Commercial off-the-shelf; Computer crime; Intrusion detection; Learning systems; Network security; SCADA systems; Terrorism; Catastrophic consequences; Commercial off-the-shelf products; Deception Attack; Industrial control systems; Intrusion Detection Systems; Intrusion detection technologies; National infrastructure; SCADA; Intelligent control | en_US |
dc.description.abstract | The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. � 2019 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 8819478 | |
dc.identifier.doi | 10.1109/BigDataSecurity-HPSC-IDS.2019.00057 | |
dc.identifier.epage | 272 | |
dc.identifier.scopus | 2-s2.0-85072773110 | |
dc.identifier.spage | 267 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85072773110&doi=10.1109%2fBigDataSecurity-HPSC-IDS.2019.00057&partnerID=40&md5=92b0e3536c49703f22dd007dad4d1512 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/24663 | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Scopus | |
dc.sourcetitle | Proceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019 | |
dc.title | An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |