4.5 Article

Current cyber-defense trends in industrial control systems

Journal

COMPUTERS & SECURITY
Volume 87, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2019.06.015

Keywords

SCADA; Industrial control; Intrusion detection; APT; Industry 4.0

Funding

  1. Spanish Ministry of Economy, Industry and Competitiveness through the SADCIP project [RTC-2016-4847-8]
  2. Spanish Ministry of Economy, Industry and Competitiveness through SMOG project [TIN2016-79095-C2-1-R]
  3. Spanish Ministry of Education under the FPU program [FPU15/03213]

Ask authors/readers for more resources

Advanced Persistent Threats (APTs) have become a serious hazard for any critical infrastructure, as a single solution to protect all industrial assets from these complex attacks does not exist. It is then essential to understand what are the defense mechanisms that can be used as a first line of defense. For this purpose, this article will firstly study the spectrum of attack vectors that APTs can use against existing and novel elements of an industrial ecosystem. Afterwards, this article will provide an analysis of the evolution and applicability of Intrusion Detection Systems (IDS) that have been proposed in both the industry and academia. (C) 2019 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Editorial Material Computer Science, Information Systems

Message from the guest editors

Takeshi Takahashi, Rodrigo Roman Castro, Bilhanan Silverajan, Ryan K. L. Ko, Said Tabet

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Editorial Material Automation & Control Systems

Guest Editorial: Special Section on Security and Privacy in Industry 4.0

Cristina Alcaraz, Yan Zhang, Alvaro Cardenas, Liehuang Zhu

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Integration of a Threat Traceability Solution in the Industrial Internet of Things

Juan E. Rubio, Rodrigo Roman, Javier Lopez

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Editorial Material Chemistry, Analytical

Sensors Cybersecurity

Dimitris A. Gritzalis, Grammati Pantziou, Rodrigo Roman-Castro

SENSORS (2021)

Editorial Material Engineering, Civil

Introduction of the Special Issue on Edge Intelligence for Internet of Vehicles

Yan Zhang, Celimuge Wu, Rodrigo Roman, Hong Liu

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

DIGITAL TWINS FOR INTELLIGENT AUTHORIZATION IN THE B5G-ENABLED SMART GRID

Javier Lopez, Juan E. Rubio, Cristina Alcaraz

Summary: This article investigates the use of digital twins in smart grids, explores the role of AI technologies in managing information flows of future applications, and discusses how digital twins can enhance their context awareness and simulation technologies to predict faults and detect cybersecurity issues in real time, updating access control policies accordingly.

IEEE WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Stakeholder perspectives and requirements on cybersecurity in Europe

Simone Fischer-Hubner, Cristina Alcaraz, Afonso Ferreira, Carmen Fernandez-Gago, Javier Lopez, Evangelos Markatos, Lejla Islami, Mahdi Akil

Summary: This article provides an overview and analysis of key cybersecurity issues, challenges, and requirements derived from interviews with 63 European stakeholders in security-critical sectors. Common themes across these sectors include trust-building, privacy and identity management, system resilience, standardization, design security and privacy, and data sharing compliance. The results also suggest cybersecurity trends and offer directions for future research and innovation activities in Europe.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Personal IoT Privacy Control at the Edge

Ruben Rios, Jose A. Onieva, Rodrigo Roman, Javier Lopez

Summary: This privacy manager for IoT data, based on edge computing, enforces privacy before data leaves user control, providing a tool for users to express data-sharing preferences based on context-aware privacy language.

IEEE SECURITY & PRIVACY (2022)

Article Computer Science, Information Systems

Classifying resilience approaches for protecting smart grids against cyber threats

Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou

Summary: This paper provides a classification and analysis of cyber resilience methods against cyber attacks in smart grids, highlighting the need for further research in scientific areas to enhance the cyber resilience of smart grids.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2022)

Article Computer Science, Information Systems

A survey on the (in)security of trusted execution environments

Antonio Munoz, Ruben Rios, Rodrigo Roman, Javier Lopez

Summary: This paper provides a comprehensive analysis and categorization of existing vulnerabilities in TEEs, highlighting the design flaws that led to them. It also presents effective countermeasures to reduce the likelihood of new attacks and discusses appealing challenges and open issues in this field.

COMPUTERS & SECURITY (2023)

Article Computer Science, Information Systems

OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0

Cristina Alcaraz, Jesus Cumplido, Alicia Trivino

Summary: Undoubtedly, Industry 4.0 has increased the rate of electric vehicle manufacturing and the installation of grid-connected charging infrastructures. This study analyzes the security risks of the latest version of the open charge point protocol (OCPP-v2.0.1), especially when charging stations are connected to microgrids. The results suggest that despite the evolution of OCPP-v2.0.1, further protection measures are needed to address potential cyber and physical threats.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Article Computer Science, Information Systems

Current Perspectives on Securing Critical Infrastructures' Supply Chains

Rodrigo Roman, Cristina Alcaraz, Javier Lopez, Kouichi Sakurai

Summary: Digitalization and industrial paradigms are reshaping critical infrastructures and supply chains, presenting opportunities to enhance trust and transparency through the deployment of emerging technologies. However, these advancements also bring vulnerabilities that need to be addressed.

IEEE SECURITY & PRIVACY (2023)

Article Computer Science, Information Systems

Digital Twin: A Comprehensive Survey of Security Threats

Cristina Alcaraz, Javier Lopez

Summary: Industry 4.0 is positively impacting the value chain through the use of digital twin technology, but it also brings security threats that need to be studied and addressed. This paper analyzes the current state of the digital twin paradigm, classifies potential threats, and provides security recommendations to ensure its appropriate and trustworthy use.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Proceedings Paper Computer Science, Information Systems

SealedGRID: A Secure Interconnection of Technologies for Smart Grid Applications

Aristeidis Farao, Juan Enrique Rubio, Cristina Alcaraz, Christoforos Ntantogian, Christos Xenakis, Javier Lopez

CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2019) (2020)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)