{"id":"https://openalex.org/W4284891397","doi":"https://doi.org/10.1109/eit53891.2022.9813829","title":"Machine Learning Models for Cyberattack Detection in Industrial Control Systems","display_name":"Machine Learning Models for Cyberattack Detection in Industrial Control Systems","publication_year":2022,"publication_date":"2022-05-19","ids":{"openalex":"https://openalex.org/W4284891397","doi":"https://doi.org/10.1109/eit53891.2022.9813829"},"language":"en","primary_location":{"id":"doi:10.1109/eit53891.2022.9813829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072393684","display_name":"David Arnold","orcid":"https://orcid.org/0000-0002-9852-7016"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Arnold","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113592455","display_name":"John Ford","orcid":null},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Ford","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018536803","display_name":"Jafar Saniie","orcid":"https://orcid.org/0000-0002-2655-6950"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jafar Saniie","raw_affiliation_strings":["Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A"],"affiliations":[{"raw_affiliation_string":"Illinois Institute of Technology,Embedded Computing and Signal Processing (ECASP) Research Laboratory,Department of Electrical and Computer Engineering,Chicago,IL,U.S.A","institution_ids":["https://openalex.org/I180949307"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Embedded Computing and Signal Processing (ECASP) Research Laboratory, Illinois Institute of Technology, Chicago, IL, U.S.A","institution_ids":["https://openalex.org/I180949307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072393684"],"corresponding_institution_ids":["https://openalex.org/I180949307"],"apc_list":null,"apc_paid":null,"fwci":0.241,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49381562,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7227458953857422},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6312988996505737},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41416609287261963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34866052865982056},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31140702962875366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7227458953857422},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6312988996505737},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41416609287261963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34866052865982056},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31140702962875366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit53891.2022.9813829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit53891.2022.9813829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1465750472","https://openalex.org/W1988596202","https://openalex.org/W2009429512","https://openalex.org/W2063520266","https://openalex.org/W2064104440","https://openalex.org/W2333073311","https://openalex.org/W2749874879","https://openalex.org/W2946990605","https://openalex.org/W3009709460","https://openalex.org/W3024906992","https://openalex.org/W6628573396"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W3040950835","https://openalex.org/W4396931782"],"abstract_inverted_index":{"Industrial":[0,139],"Control":[1,140],"Systems":[2,141],"(ICS)":[3],"provide":[4],"a":[5],"network":[6],"environment":[7],"for":[8,55,135],"operator":[9],"command":[10],"and":[11,16,29,72,88,99,153,187],"control":[12],"of":[13,37,44,114],"cyber-physical":[14],"systems":[15,21],"devices.":[17],"As":[18],"such,":[19],"these":[20],"are":[22,47,154],"common":[23],"throughout":[24],"power":[25],"plants,":[26],"pipelines,":[27],"manufactories,":[28],"other":[30],"critical":[31,38],"infrastructure.":[32],"Due":[33],"to":[34,68,84,95,108,121,126,168,172],"the":[35,66,93,150,157,174,197,201],"importance":[36],"infrastructure":[39],"in":[40,52,75],"everyday":[41],"life,":[42],"hackers":[43],"all":[45],"stripes":[46],"taking":[48],"an":[49,169],"increased":[50],"interest":[51],"compromising":[53],"ICS":[54,85,170],"personal":[56],"gain":[57],"or":[58,80,117],"nefarious":[59],"purposes.":[60],"Recent":[61],"high-profile":[62],"attacks":[63],"also":[64],"highlight":[65],"need":[67],"monitor":[69],"system":[70,127],"process":[71],"sensor":[73],"data":[74,86,110],"detecting":[76,178],"compromised":[77],"user":[78],"accounts":[79],"insider":[81],"threats.":[82],"Central":[83],"collection":[87],"monitoring,":[89],"Data":[90,151],"Historians":[91],"hold":[92],"key":[94],"identifying":[96],"malicious":[97],"behavior":[98],"cyber":[100],"breaches.":[101],"Machine":[102,191],"Learning":[103,192],"techniques":[104],"may":[105],"be":[106,143],"applied":[107,167],"detect":[109],"that":[111],"is":[112],"indicative":[113],"part":[115],"failures":[116],"cyberattacks,":[118],"allowing":[119],"operators":[120],"take":[122],"preventative":[123],"measures":[124],"prior":[125],"failure.":[128],"In":[129],"this":[130],"paper,":[131],"several":[132],"machine":[133,163],"models":[134,146,193],"cyberattack":[136],"detection":[137],"within":[138,149],"will":[142,147],"introduced.":[144],"These":[145],"reside":[148],"Historian":[152],"implemented":[155],"through":[156],"Apache":[158],"Spark":[159],"MLlib":[160],"Libraries.":[161],"The":[162],"learning":[164],"model":[165],"were":[166,194],"Dataset":[171],"determine":[173],"system\u2019s":[175],"accuracy":[176],"at":[177],"cyberattacks.":[179],"Na\u00efve":[180],"Bayes,":[181],"Logistic":[182],"Regression,":[183],"Decision":[184],"Tree":[185,198],"Classifier,":[186],"Random":[188],"Forest":[189],"Classifier":[190],"tested":[195],"with":[196],"Classifiers":[199],"producing":[200],"most":[202],"promising":[203],"results.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
