Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques
- Ángel Luis Perales Gómez, 1
- Lorenzo Fernández Maimó, 1
- Alberto Huertas Celdrán 2
- Felix J. García Clemente 1
- 1 University of Murcia, Spain
- 2 University of Zurich, Switzerland
Libro:
Advances in Malware and Data-Driven Network Security
ISSN: 1948-9730, 1948-9749
Año de publicación: 2022
Páginas: 74-93
Tipo: Capítulo de Libro
Referencias bibliográficas
- S.Adepu, (2018), Computer Security, pp. 37
- 10.1016/j.ijcip.2020.100356
- 10.1109/ICMLA.2013.105
- Boyer, S. A. (1999). SCADA: Supervisory control and data acquisition (Vol. 3). ISA.
- 10.1016/j.compind.2018.04.015
- Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
- Cvitić, I., Peraković, D., Periša, M., & Gupta, B. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics, 1-24. https://www.ll.mit.edu/r-d/datasets/1998-darpa-intrusion-detection-evaluation-dataset
- N. S. L.-K. D. D.Dataset
- 10.1007/s10916-017-0752-1
- 10.1109/ACCESS.2020.2975066
- 10.1115/1.4037963
- Garcia, S., Grill, M., Stiborek, J., & Zunino, A. (2014). An empirical comparison of botnet detection methods. Computers & Security, 45, 100-123.
- Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning: data mining, inference, and prediction. Springer Science & Business Media. Industrial Control System (ICS) Cyber Attack Datasets. https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets
- Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C. M., & Sun, J. (2017, November). Anomaly detection for a water treatment system using unsupervised machine learning. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 1058-1065). IEEE. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
- Khalid, A., Kirisci, P., Ghrairi, Z., Thoben, K. D., & Pannek, J. (2017, July). Towards implementing safety and security concepts for human-robot collaboration in the context of Industry 4.0. In 39th International MATADOR Conference on Advanced Manufacturing (Manchester, UK).
- 10.1016/j.compind.2018.02.009
- 10.1016/j.ifset.2018.05.011
- 10.1145/3264888.3264896
- 10.1109/TDSC.2021.3050101
- 10.1109/MC.2017.4451203
- 10.1109/MSP.2011.67
- 10.1007/s12599-014-0334-4
- Lavin, A., & Ahmad, S. (2015, December). Evaluating Real-Time anomaly detection algorithms--The Numenta anomaly benchmark. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 38-44). IEEE.
- 10.1007/978-3-030-30490-4_56
- 10.1109/COMST.2008.4483668
- 10.1016/j.jnca.2012.09.004
- Lien, J., Amihood, P. M., Javidan, A. J., Karagozler, M. E., Olson, E. M., & Poupyrev, I. (2017). Embedding Radars in Robots for Safety and Obstacle Detection. Academic Press.
- X.Lyu, (2019), Theory & Applications, 4, pp. 221
- Mathur, A. P., & Tippenhauer, N. O. (2016, April). SWaT: a water treatment testbed for research and training on ICS security. In 2016 international workshop on cyber-physical systems for smart water networks (CySWater) (pp. 31-36). IEEE.
- 10.1145/2380790.2380805
- 10.1109/PST.2016.7906943
- D.Moore, (2003), The spread of the sapphire/slammer worm
- 10.1007/978-3-662-45355-1_5
- 10.1016/j.ijcip.2011.06.005
- 10.1016/S1361-3723(12)70102-1
- 10.1016/j.cose.2012.02.009
- 10.1109/TSG.2015.2409775
- 10.1007/978-3-030-34272-2_11
- Peraković, D., Periša, M., Cvitić, I., & Zorić, P. (n.d.). Information and communication technologies for the society 5.0 environment. Academic Press.
- 10.3390/sym12101583
- 10.1109/ACCESS.2019.2958284
- Perales Gómez, Á. L., Fernández Maimó, L., Huertas Celdrán, A., García Clemente, F. J., & Cleary, F. (2021). Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems. In The 4th International Conference on Emerging Data and Industry 4.0 (EDI40).
- Á. L.Perales Gómez, (2020), Software, Practice & Experience
- Pillitteri, V. Y., & Brewer, T. L. (2014). Guidelines for smart grid cybersecurity. Academic Press.
- 10.1115/GT2003-38407
- Rege, A., & Bleiman, R. (2020, June). Ransomware Attacks Against Critical Infrastructure. In ECCWS 2020 20th European Conference on Cyber Warfare and Security (p. 324). Academic Conferences and Publishing Limited. https://www.risidata.com/
- 10.1016/j.cirp.2017.04.037
- Shalyga, D., Filonov, P., & Lavrentyev, A. (2018). Anomaly detection for water treatment system based on neural network with automatic architecture optimization. arXiv preprint arXiv:1807.07282.
- 10.5220/0006639801080116
- Skobelev, P. O., & Borovik, S. Y. (2017). On the way from Industry 4.0 to Industry 5.0: from digital manufacturing to digital society. Industry 4.0, 2(6), 307-311.
- 10.1061/(ASCE)WR.1943-5452.0000969
- Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.
- 10.1109/ICE.2019.8792814
- 10.1109/ACCESS.2019.2895334
- Wu, H., Schwab, S., & Peckham, R. L. (2008). U.S. Patent No. 7,424,744. Washington, DC: U.S. Patent and Trademark Office.
- 10.1109/ACCESS.2018.2836950
- 10.1109/TSMC.2020.2968516
- 10.1109/ICDCSW.2013.30
- Zizzo, G., Hankin, C., Maffeis, S., & Jones, K. (2019). Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks. arXiv preprint arXiv:1911.04278.