{"id":"https://openalex.org/W3011215978","doi":"https://doi.org/10.1109/jsac.2020.2980921","title":"<i>iFinger</i>: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting","display_name":"<i>iFinger</i>: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting","publication_year":2020,"publication_date":"2020-03-17","ids":{"openalex":"https://openalex.org/W3011215978","doi":"https://doi.org/10.1109/jsac.2020.2980921","mag":"3011215978"},"language":"en","primary_location":{"id":"doi:10.1109/jsac.2020.2980921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2020.2980921","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jsac.2020.2980921","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100640657","display_name":"Kai Yang","orcid":"https://orcid.org/0000-0002-1360-8141"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Yang","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100429920","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0001-9833-2836"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiang Li","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["School of Computer Science, University of Guelph, Guelph, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048057817","display_name":"Xin Chen","orcid":"https://orcid.org/0000-0002-5250-7909"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Chen","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061643975","display_name":"Limin Sun","orcid":"https://orcid.org/0000-0003-2745-7521"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Limin Sun","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100640657"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":3.57,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.92914013,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"38","issue":"5","first_page":"955","last_page":"967"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8509975671768188},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6907200813293457},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5447089076042175},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5415670275688171},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5006332397460938},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4638291597366333},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.45076262950897217},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.4278857409954071},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3901805877685547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3582429885864258},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3387511968612671},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2289545238018036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1530589759349823},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10033184289932251}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8509975671768188},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6907200813293457},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5447089076042175},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5415670275688171},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5006332397460938},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4638291597366333},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.45076262950897217},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.4278857409954071},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3901805877685547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3582429885864258},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3387511968612671},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2289545238018036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1530589759349823},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10033184289932251},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2020.2980921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2020.2980921","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jsac.2020.2980921","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2020.2980921","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G3577225124","display_name":null,"funder_award_id":"2018YFC1201102","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4938631274","display_name":null,"funder_award_id":"U1766215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7411430048","display_name":null,"funder_award_id":"61972024","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8256099982","display_name":null,"funder_award_id":"U1636120","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8937319365","display_name":null,"funder_award_id":"XDC02020500","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W38537450","https://openalex.org/W152620456","https://openalex.org/W1975554273","https://openalex.org/W2001463638","https://openalex.org/W2002578057","https://openalex.org/W2021153127","https://openalex.org/W2038651258","https://openalex.org/W2039427951","https://openalex.org/W2056451850","https://openalex.org/W2068693276","https://openalex.org/W2080611336","https://openalex.org/W2104599106","https://openalex.org/W2184570813","https://openalex.org/W2518033045","https://openalex.org/W2578943040","https://openalex.org/W2603831296","https://openalex.org/W2613843087","https://openalex.org/W2748868501","https://openalex.org/W2763836003","https://openalex.org/W2765964429","https://openalex.org/W2782500360","https://openalex.org/W2792078122","https://openalex.org/W2796861472","https://openalex.org/W2888774481","https://openalex.org/W2891250288","https://openalex.org/W2891599753","https://openalex.org/W2901909474","https://openalex.org/W2963491590","https://openalex.org/W2986455874","https://openalex.org/W3099793430","https://openalex.org/W3103553961","https://openalex.org/W4255815195","https://openalex.org/W6601553728","https://openalex.org/W6606141063","https://openalex.org/W6743493502","https://openalex.org/W6753952642"],"related_works":["https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2393030234","https://openalex.org/W2379730136","https://openalex.org/W2088149615","https://openalex.org/W3198851420","https://openalex.org/W4300305156","https://openalex.org/W2728426605"],"abstract_inverted_index":{"Nowadays,":[0],"the":[1,14,52,88,111,120,124,135,157,193],"industrial":[2,45,66,76,108,199],"control":[3],"system":[4],"(ICS)":[5],"plays":[6],"a":[7,54,130,154],"vital":[8],"role":[9],"in":[10,176,198],"critical":[11],"infrastructures":[12],"like":[13],"power":[15],"grid.":[16],"However,":[17],"there":[18],"is":[19],"an":[20,72],"increasing":[21],"security":[22],"concern":[23],"that":[24,75,83,169],"ICS":[25,61,92,101,121,136,177,185],"devices":[26],"are":[27,84],"being":[28],"vulnerable":[29],"to":[30,44,59,64,86,99,103,163,191],"malicious":[31,105,207],"users/attackers,":[32],"where":[33],"any":[34],"subtle":[35],"changing":[36],"or":[37],"tampering":[38],"attack":[39],"would":[40,204],"cause":[41],"significant":[42],"damage":[43],"manufacturing.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,138,181],"propose":[51,139],"iFinger,":[53],"novel":[55],"detection":[56,141],"approach":[57,171],"designed":[58],"mitigate":[60],"attacks":[62,106,186,208],"adapting":[63],"various":[65],"scenes.":[67],"We":[68,152],"take":[69],"advantage":[70],"of":[71,91,119,156,195],"important":[73],"insight":[74],"protocol":[77],"packets":[78],"include":[79],"register":[80,97,116],"status":[81],"values":[82],"used":[85],"reflect":[87],"physical":[89],"characteristics":[90],"controllers.":[93],"The":[94],"iFinger":[95,158,197],"utilizes":[96],"states":[98],"generate":[100],"fingerprints":[102,203],"detect":[104,205],"on":[107,144],"networks.":[109,200],"Specifically,":[110],"boolean":[112],"logic":[113],"represents":[114],"every":[115],"state":[117],"sequence":[118],"controller,":[122],"and":[123,149,159,188],"deterministic":[125],"finite":[126],"automaton":[127],"(DFA)":[128],"generates":[129],"device":[131,145,178,202],"fingerprint.":[132],"To":[133],"discover":[134],"attacks,":[137],"two":[140,183],"approaches":[142],"based":[143],"fingerprints,":[146],"including":[147],"passive":[148],"active":[150],"detection.":[151],"present":[153],"prototype":[155],"conduct":[160],"real-world":[161],"experiments":[162],"validate":[164,192],"its":[165],"performance.":[166],"Results":[167],"show":[168],"our":[170,196],"achieves":[172],"97.1%":[173],"F1":[174],"score":[175],"identification.":[179],"Furthermore,":[180],"simulate":[182],"typical":[184],"(replacement":[187],"code":[189],"modification)":[190],"effectiveness":[194],"Our":[201],"those":[206],"within":[209],"2s":[210],"latency":[211],"at":[212],"98.0%":[213],"recall.":[214]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
