Devil in the detail: Attack scenarios in industrial applications

9Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.

Cite

CITATION STYLE

APA

Duque Anton, S. D., Hafner, A., & Schotten, H. D. (2019). Devil in the detail: Attack scenarios in industrial applications. In Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019 (pp. 169–174). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2019.00040

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free