Nov. 29, 2022, 2:10 a.m. | Moses Ike, Kandy Phan, Keaton Sadoski, Romuald Valme, Wenke Lee

cs.CR updates on arXiv.org arxiv.org

Modern Industrial Control Systems (ICS) attacks evade existing tools by using
knowledge of ICS processes to blend their activities with benign Supervisory
Control and Data Acquisition (SCADA) operation, causing physical world damages.
We present SCAPHY to detect ICS attacks in SCADA by leveraging the unique
execution phases of SCADA to identify the limited set of legitimate behaviors
to control the physical world in different phases, which differentiates from
attackers activities. For example, it is typical for SCADA to setup ICS …

attacks ics physical scada

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066