{"id":"https://openalex.org/W2970454698","doi":"https://doi.org/10.1109/bigdatasecurity-hpsc-ids.2019.00057","title":"An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems","display_name":"An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2970454698","doi":"https://doi.org/10.1109/bigdatasecurity-hpsc-ids.2019.00057","mag":"2970454698"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdatasecurity-hpsc-ids.2019.00057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004151950","display_name":"Qais Saif Qassim","orcid":"https://orcid.org/0000-0002-6391-5246"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Q.S. Qassim","raw_affiliation_strings":["Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014561100","display_name":"Abdul Rahim Ahmad","orcid":"https://orcid.org/0000-0001-6305-0660"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"A.R. Ahmad","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102704870","display_name":"Roslan Ismail","orcid":"https://orcid.org/0000-0003-2746-0683"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"R. Ismail","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103556470","display_name":"Azuraliza Abu Bakar","orcid":null},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"A. Abu Bakar","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020402311","display_name":"Fiza Abdul Rahim","orcid":"https://orcid.org/0000-0001-7746-6843"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"F. Abdul Rahim","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112464234","display_name":"M.Z. Mokhtar","orcid":null},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"M.Z. Mokhtar","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087171984","display_name":"Ramona Ramli","orcid":"https://orcid.org/0000-0003-0920-2576"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"R. Ramli","raw_affiliation_strings":["College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"College of Computing & Informatics, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]},{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073644942","display_name":"Bin Yusof","orcid":null},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"B. Mohd Yusof","raw_affiliation_strings":["Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007575598","display_name":"Mohammed Najah Mahdi","orcid":"https://orcid.org/0000-0001-8718-6458"},"institutions":[{"id":"https://openalex.org/I79156528","display_name":"Universiti Tenaga Nasional","ror":"https://ror.org/03kxdn807","country_code":"MY","type":"education","lineage":["https://openalex.org/I79156528","https://openalex.org/I874769580"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammed Najah Mahdi","raw_affiliation_strings":["Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, 43000, Malaysia"],"affiliations":[{"raw_affiliation_string":"Institute of Informatics and Computing in Energy, Universiti Tenaga Nasional, 43000, Malaysia","institution_ids":["https://openalex.org/I79156528"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.71,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.698712,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"267","last_page":"272"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9968,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.7809909},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.45168835}],"concepts":[{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.7809909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7771035},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.71991676},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6915346},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6087624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5697858},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.50820684},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.47563696},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.45168835},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3802954},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdatasecurity-hpsc-ids.2019.00057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.46}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1505882567","https://openalex.org/W1989795116","https://openalex.org/W2002619227","https://openalex.org/W2039148409","https://openalex.org/W2048063069","https://openalex.org/W2051054517","https://openalex.org/W2059966511","https://openalex.org/W2131060714","https://openalex.org/W2330650066","https://openalex.org/W2341697730","https://openalex.org/W2550453031","https://openalex.org/W2579484153","https://openalex.org/W2619874920","https://openalex.org/W2736680659","https://openalex.org/W2782611461","https://openalex.org/W2963082174","https://openalex.org/W4256497308"],"related_works":["https://openalex.org/W4328089757","https://openalex.org/W4223615774","https://openalex.org/W383057355","https://openalex.org/W3203827585","https://openalex.org/W3161403725","https://openalex.org/W3084463301","https://openalex.org/W2937619061","https://openalex.org/W2906767284","https://openalex.org/W2904712365","https://openalex.org/W2728426605"],"abstract_inverted_index":{"The":[0],"increasing":[1],"interaction":[2],"of":[3,23,28,81],"modern":[4],"industrial":[5],"control":[6],"systems":[7,17,70],"(ICS)":[8],"to":[9,19,42,67,110],"the":[10,26,57,82,115],"outside":[11],"Internet":[12],"world":[13],"influences":[14],"making":[15],"these":[16,69],"vulnerable":[18],"a":[20,107],"wide":[21],"range":[22],"cyber-attacks.":[24,72],"Moreover,":[25],"utilisation":[27],"Commercial-off-the-Shelf":[29],"(COTS)":[30],"products,":[31],"as":[32,34,79],"well":[33],"open":[35],"communication":[36],"protocols,":[37],"made":[38],"them":[39],"attractive":[40],"targets":[41],"various":[43],"threat":[44],"agents":[45],"including":[46],"cyber-criminals,":[47],"national-state,":[48],"and":[49,96,99],"cyber-terrorists.":[50],"Given":[51],"that,":[52],"today's":[53],"ICSs":[54],"are":[55],"deriving":[56],"most":[58,83],"critical":[59],"national":[60],"infrastructures.":[61],"Therefore,":[62],"this":[63],"raises":[64],"tremendous":[65],"needs":[66],"secure":[68],"against":[71],"Intrusion":[73],"detection":[74],"technology":[75],"has":[76],"been":[77],"considered":[78],"one":[80],"essential":[84],"security":[85],"precautions":[86],"for":[87],"ICS":[88,116],"networks.":[89],"It":[90],"can":[91],"effectively":[92],"detect":[93,111],"potential":[94],"cyber-attacks":[95],"malicious":[97,112],"activities":[98,113],"prevent":[100],"catastrophic":[101],"consequences.":[102],"This":[103],"paper":[104],"puts":[105],"forward":[106],"new":[108],"method":[109],"at":[114],"net-works.":[117]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2970454698","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-01-17T11:19:06.036247","created_date":"2019-09-05"}