Browse > Article

SWaT 테스트베드 데이터 셋 및 비정상행위 탐지 동향  

Kwon, Sungmoon (아주대학교 컴퓨터공학과)
Shon, Taeshik (아주대학교 사이버보안학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Goh, Jonathan, et al. "A dataset to support research in the design of secure water treatment systems." International Conference on Critical Information Infrastructures Security. Springer, Cham, 2016.
2 SWaT testbed, by iTrust of SUTD, [Online]. Available: https://itrust.sutd.edu.sg/testbeds/secure-water-treatment-swat/
3 Agrawal, Anand, Chuadhry Mujeeb Ahmed, and Ee-Chien Chang. "Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System." Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, 2018.
4 Goh, Jonathan, et al. "Anomaly detection in cyber physical systems using recurrent neural networks." 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 2017.
5 Lin, Qin, et al. "TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems." Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, 2018.
6 Feng, Cheng, et al. "A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems." (2019).
7 Gregory F Cooper and Edward Herskovits. 1992. A Bayesian method for the induction of probabilistic networks from data. Machine learning 9, 4 (1992), 309-347.   DOI
8 Liu, Yao, Peng Ning, and Michael K. Reiter. "False data injection attacks against state estimation in electric power grids." ACM Transactions on Information and System Security (TISSEC) 14.1 (2011): 13.
9 Kwon, Sungmoon, Hyunguk Yoo, and Taeshik Shon. "Recovery Measure against Disabling Reassembly Attack to DNP3 Communication." IEICE Transactions on Information and Systems 100.8 (2017): 1790-1797.