Please use this identifier to cite or link to this item:
http://dspace.uniten.edu.my/jspui/handle/123456789/13030
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qassim, Q. | en_US |
dc.contributor.author | Ahmad, A.R. | en_US |
dc.contributor.author | Ismail, R. | en_US |
dc.contributor.author | Abu Bakar, A. | en_US |
dc.contributor.author | Abdul Rahim, F. | en_US |
dc.contributor.author | Mokhtar, M.Z. | en_US |
dc.contributor.author | Ramli, R. | en_US |
dc.contributor.author | Mohd Yusof, B. | en_US |
dc.contributor.author | Mahdi, M.N. | en_US |
dc.date.accessioned | 2020-02-03T03:29:54Z | - |
dc.date.available | 2020-02-03T03:29:54Z | - |
dc.date.issued | 2019 | - |
dc.description.abstract | The increasing interaction of modern industrial control systems (ICS) to the outside Internet world influences making these systems vulnerable to a wide range of cyber-attacks. Moreover, the utilisation of Commercial-off-the-Shelf (COTS) products, as well as open communication protocols, made them attractive targets to various threat agents including cyber-criminals, national-state, and cyber-terrorists. Given that, today's ICSs are deriving the most critical national infrastructures. Therefore, this raises tremendous needs to secure these systems against cyber-attacks. Intrusion detection technology has been considered as one of the most essential security precautions for ICS networks. It can effectively detect potential cyber-attacks and malicious activities and prevent catastrophic consequences. This paper puts forward a new method to detect malicious activities at the ICS net-works. © 2019 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.title | An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | 10.1109/BigDataSecurity-HPSC-IDS.2019.00057 | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
Appears in Collections: | UNITEN Scholarly Publication |
Files in This Item:
File | Size | Format | |
---|---|---|---|
An Anomaly Detection Technique for Deception.pdf | 515.77 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.