Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    REVIEW

    Intrusion Detection Systems in Industrial Control Systems: Landscape, Challenges and Opportunities

    Tong Wu, Dawei Zhou, Qingyu Ou*, Fang Luo

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073482 - 12 January 2026

    Abstract The increasing interconnection of modern industrial control systems (ICSs) with the Internet has enhanced operational efficiency, but also made these systems more vulnerable to cyberattacks. This heightened exposure has driven a growing need for robust ICS security measures. Among the key defences, intrusion detection technology is critical in identifying threats to ICS networks. This paper provides an overview of the distinctive characteristics of ICS network security, highlighting standard attack methods. It then examines various intrusion detection methods, including those based on misuse detection, anomaly detection, machine learning, and specialised requirements. This paper concludes by exploring More >

  • Open Access

    ARTICLE

    Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)

    Hariharan Ramachandran1,*, Richard Smith2, Kenny Awuson David1,*, Tawfik Al-Hadhrami3, Parag Acharya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3619-3641, 2025, DOI:10.32604/cmc.2024.054802 - 17 February 2025

    Abstract This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios… More >

  • Open Access

    ARTICLE

    Programmable Logic Controller Block Monitoring System for Memory Attack Defense in Industrial Control Systems

    Mingyu Lee1, Jiho Shin2, Jung Taek Seo3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2427-2442, 2023, DOI:10.32604/cmc.2023.041774 - 29 November 2023

    Abstract Cyberattacks targeting industrial control systems (ICS) are becoming more sophisticated and advanced than in the past. A programmable logic controller (PLC), a core component of ICS, controls and monitors sensors and actuators in the field. However, PLC has memory attack threats such as program injection and manipulation, which has long been a major target for attackers, and it is important to detect these attacks for ICS security. To detect PLC memory attacks, a security system is required to acquire and monitor PLC memory directly. In addition, the performance impact of the security system on the… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475 - 31 October 2023

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712 - 01 August 2022

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283 - 18 May 2022

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and… More >

  • Open Access

    ARTICLE

    Intelligent Forensic Investigation Using Optimal Stacked Autoencoder for Critical Industrial Infrastructures

    Abdullah S. AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, F. J. Alsolami5, Hani Choudhry3,6, Ibrahim Rizqallah Alzahrani7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2275-2289, 2022, DOI:10.32604/cmc.2022.026226 - 29 March 2022

    Abstract Industrial Control Systems (ICS) can be employed on the industrial processes in order to reduce the manual labor and handle the complicated industrial system processes as well as communicate effectively. Internet of Things (IoT) integrates numerous sets of sensors and devices via a data network enabling independent processes. The incorporation of the IoT in the industrial sector leads to the design of Industrial Internet of Things (IIoT), which find use in water distribution system, power plants, etc. Since the IIoT is susceptible to different kinds of attacks due to the utilization of Internet connection, an… More >

Displaying 1-10 on page 1 of 7. Per Page