Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Alessandro ErbaRiccardo TaorminaStefano GalelliMarcello PoglianiMichele CarminatiStefano ZaneroNils Ole TippenhauerPublished in: ACSAC (2020)
Keyphrases
- control system
- industrial automation
- anomaly detection
- three dimensional
- industrial applications
- post processing
- error concealment
- countermeasures
- image reconstruction
- intrusion detection
- object detection
- malicious attacks
- reconstruction method
- network traffic
- closed loop
- security mechanisms
- high resolution
- discrete tomography
- chosen plaintext
- negative selection algorithm
- malicious users
- detecting anomalies
- abnormal events
- normal behavior
- reconstruction process
- real time
- watermarking scheme