Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques

  1. Ángel Luis Perales Gómez, 1
  2. Lorenzo Fernández Maimó, 1
  3. Alberto Huertas Celdrán 2
  4. Felix J. García Clemente 1
  1. 1 University of Murcia, Spain
  2. 2 University of Zurich, Switzerland
Libro:
Advances in Malware and Data-Driven Network Security

ISSN: 1948-9730 1948-9749

Año de publicación: 2022

Páginas: 74-93

Tipo: Capítulo de Libro

DOI: 10.4018/978-1-7998-7789-9.CH005 GOOGLE SCHOLAR lock_openAcceso abierto editor

Referencias bibliográficas

  • S.Adepu, (2018), Computer Security, pp. 37
  • 10.1016/j.ijcip.2020.100356
  • 10.1109/ICMLA.2013.105
  • Boyer, S. A. (1999). SCADA: Supervisory control and data acquisition (Vol. 3). ISA.
  • 10.1016/j.compind.2018.04.015
  • Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
  • Cvitić, I., Peraković, D., Periša, M., & Gupta, B. (2021). Ensemble machine learning approach for classification of IoT devices in smart home. International Journal of Machine Learning and Cybernetics, 1-24. https://www.ll.mit.edu/r-d/datasets/1998-darpa-intrusion-detection-evaluation-dataset
  • N. S. L.-K. D. D.Dataset
  • 10.1007/s10916-017-0752-1
  • 10.1109/ACCESS.2020.2975066
  • 10.1115/1.4037963
  • Garcia, S., Grill, M., Stiborek, J., & Zunino, A. (2014). An empirical comparison of botnet detection methods. Computers & Security, 45, 100-123.
  • Hastie, T., Tibshirani, R., & Friedman, J. (2009). The elements of statistical learning: data mining, inference, and prediction. Springer Science & Business Media. Industrial Control System (ICS) Cyber Attack Datasets. https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets
  • Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C. M., & Sun, J. (2017, November). Anomaly detection for a water treatment system using unsupervised machine learning. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 1058-1065). IEEE. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  • Khalid, A., Kirisci, P., Ghrairi, Z., Thoben, K. D., & Pannek, J. (2017, July). Towards implementing safety and security concepts for human-robot collaboration in the context of Industry 4.0. In 39th International MATADOR Conference on Advanced Manufacturing (Manchester, UK).
  • 10.1016/j.compind.2018.02.009
  • 10.1016/j.ifset.2018.05.011
  • 10.1145/3264888.3264896
  • 10.1109/TDSC.2021.3050101
  • 10.1109/MC.2017.4451203
  • 10.1109/MSP.2011.67
  • 10.1007/s12599-014-0334-4
  • Lavin, A., & Ahmad, S. (2015, December). Evaluating Real-Time anomaly detection algorithms--The Numenta anomaly benchmark. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (pp. 38-44). IEEE.
  • 10.1007/978-3-030-30490-4_56
  • 10.1109/COMST.2008.4483668
  • 10.1016/j.jnca.2012.09.004
  • Lien, J., Amihood, P. M., Javidan, A. J., Karagozler, M. E., Olson, E. M., & Poupyrev, I. (2017). Embedding Radars in Robots for Safety and Obstacle Detection. Academic Press.
  • X.Lyu, (2019), Theory & Applications, 4, pp. 221
  • Mathur, A. P., & Tippenhauer, N. O. (2016, April). SWaT: a water treatment testbed for research and training on ICS security. In 2016 international workshop on cyber-physical systems for smart water networks (CySWater) (pp. 31-36). IEEE.
  • 10.1145/2380790.2380805
  • 10.1109/PST.2016.7906943
  • D.Moore, (2003), The spread of the sapphire/slammer worm
  • 10.1007/978-3-662-45355-1_5
  • 10.1016/j.ijcip.2011.06.005
  • 10.1016/S1361-3723(12)70102-1
  • 10.1016/j.cose.2012.02.009
  • 10.1109/TSG.2015.2409775
  • 10.1007/978-3-030-34272-2_11
  • Peraković, D., Periša, M., Cvitić, I., & Zorić, P. (n.d.). Information and communication technologies for the society 5.0 environment. Academic Press.
  • 10.3390/sym12101583
  • 10.1109/ACCESS.2019.2958284
  • Perales Gómez, Á. L., Fernández Maimó, L., Huertas Celdrán, A., García Clemente, F. J., & Cleary, F. (2021). Crafting Adversarial Samples for Anomaly Detectors in Industrial Control Systems. In The 4th International Conference on Emerging Data and Industry 4.0 (EDI40).
  • Á. L.Perales Gómez, (2020), Software, Practice & Experience
  • Pillitteri, V. Y., & Brewer, T. L. (2014). Guidelines for smart grid cybersecurity. Academic Press.
  • 10.1115/GT2003-38407
  • Rege, A., & Bleiman, R. (2020, June). Ransomware Attacks Against Critical Infrastructure. In ECCWS 2020 20th European Conference on Cyber Warfare and Security (p. 324). Academic Conferences and Publishing Limited. https://www.risidata.com/
  • 10.1016/j.cirp.2017.04.037
  • Shalyga, D., Filonov, P., & Lavrentyev, A. (2018). Anomaly detection for water treatment system based on neural network with automatic architecture optimization. arXiv preprint arXiv:1807.07282.
  • 10.5220/0006639801080116
  • Skobelev, P. O., & Borovik, S. Y. (2017). On the way from Industry 4.0 to Industry 5.0: from digital manufacturing to digital society. Industry 4.0, 2(6), 307-311.
  • 10.1061/(ASCE)WR.1943-5452.0000969
  • Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1-6). IEEE.
  • 10.1109/ICE.2019.8792814
  • 10.1109/ACCESS.2019.2895334
  • Wu, H., Schwab, S., & Peckham, R. L. (2008). U.S. Patent No. 7,424,744. Washington, DC: U.S. Patent and Trademark Office.
  • 10.1109/ACCESS.2018.2836950
  • 10.1109/TSMC.2020.2968516
  • 10.1109/ICDCSW.2013.30
  • Zizzo, G., Hankin, C., Maffeis, S., & Jones, K. (2019). Intrusion detection for industrial control systems: Evaluation analysis and adversarial attacks. arXiv preprint arXiv:1911.04278.