Publication:
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems

dc.citedby3
dc.contributor.authorQassim Q.en_US
dc.contributor.authorAhmad A.R.en_US
dc.contributor.authorIsmail R.en_US
dc.contributor.authorAbu Bakar A.en_US
dc.contributor.authorAbdul Rahim F.en_US
dc.contributor.authorMokhtar M.Z.en_US
dc.contributor.authorRamli R.en_US
dc.contributor.authorMohd Yusof B.en_US
dc.contributor.authorMahdi M.N.en_US
dc.contributor.authorid36613541700en_US
dc.contributor.authorid35589598800en_US
dc.contributor.authorid15839357700en_US
dc.contributor.authorid35178991300en_US
dc.contributor.authorid57350579500en_US
dc.contributor.authorid36544184200en_US
dc.contributor.authorid57191413657en_US
dc.contributor.authorid57215353012en_US
dc.contributor.authorid56727803900en_US
dc.date.accessioned2023-05-29T07:25:37Z
dc.date.available2023-05-29T07:25:37Z
dc.date.issued2019
dc.descriptionAnomaly detection; Big data; Commercial off-the-shelf; Computer crime; Intrusion detection; Learning systems; Network security; SCADA systems; Terrorism; Catastrophic consequences; Commercial off-the-shelf products; Deception Attack; Industrial control systems; Intrusion Detection Systems; Intrusion detection technologies; National infrastructure; SCADA; Intelligent controlen_US
dc.description.abstractThe increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. � 2019 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo8819478
dc.identifier.doi10.1109/BigDataSecurity-HPSC-IDS.2019.00057
dc.identifier.epage272
dc.identifier.scopus2-s2.0-85072773110
dc.identifier.spage267
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85072773110&doi=10.1109%2fBigDataSecurity-HPSC-IDS.2019.00057&partnerID=40&md5=92b0e3536c49703f22dd007dad4d1512
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24663
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitleProceedings - 5th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2019, 5th IEEE International Conference on High Performance and Smart Computing, HPSC 2019 and 4th IEEE International Conference on Intelligent Data and Security, IDS 2019
dc.titleAn Anomaly Detection Technique for Deception Attacks in Industrial Control Systemsen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections