ics intrusion detection. In Proceedings of the 2Nd
ACM Workshop on Cyber-Physical Systems Security
and Privacy (CPS-SPC’16), pages 23–34, New York,
NY, USA. ACM.
Joshi, R., Didier, P., Jimenez, J., and Carey, T. (2017). The
Industrial Internet of Things Volume G5: Connectiv-
ity Framework. Industrial Internet Consortium Re-
port.
Junejo, K. N. and Goh, J. (2016). Behaviour-based attack
detection and classification in cyber physical systems
using machine learning. In Proceedings of the 2Nd
ACM International Workshop on Cyber-Physical Sys-
tem Security (CPSS’16), pages 34–43, New York, NY,
USA. ACM.
Khan, A. and Turowski, K. (2016). A survey of current
challenges in manufacturing industry and preparation
for industry 4.0. In In Proceedings of the First Inter-
national Scientific Conference “Intelligent Informa-
tion Technologies for Industry” (IITI’16), pages 15–
26. Springer International Publishing.
Krotofil, M. and Gollmann, D. (2013). Industrial con-
trol systems security: What is happening? In 11th
IEEE International Conference on Industrial Infor-
matics (INDIN’13), pages 670–675.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security & Privacy, 9(3):49–51.
Leidos (2016). Insider Threat Detection Platform - Wisdom
ITI. https://cyber.leidos.com/products/insider-threat-
detection. [Online; Accessed March 2017].
L
´
evy-Bencheton, C., Marinos, L., Mattioli, R., King, T.,
Dietzel, C., Jan, S., et al. (2015). Threat landscape and
good practice guide for internet infrastructure. Report,
European Union Agency for Network and Information
Security (ENISA).
Lin, C.-T. (1974). Structural controllability. IEEE Transac-
tions on Automatic Control, 19(3):201–208.
Liu, Y., Corbett, C., Chiang, K., Archibald, R., Mukherjee,
B., and Ghosal, D. (2009). Sidd: A framework for de-
tecting sensitive data exfiltration by an insider attack.
In 42nd Hawaii International Conference on System
Sciences, pages 1–10.
Lontorfos, G., Fairbanks, K. D., Watkins, L., and Robin-
son, W. H. (2015). Remotely inferring device manip-
ulation of industrial control systems via network be-
havior. In IEEE 40th Local Computer Networks Con-
ference Workshops (LCN Workshops’15), pages 603–
610.
McParland, C., Peisert, S., and Scaglione, A. (2014). Mon-
itoring security of networked control systems: It’s the
physics. IEEE Security Privacy, 12(6):32–39.
Mission Secure (2017). MSi Secure Sentinel Platform.
http://www.missionsecure.com/solutions/. [Online;
Accessed March 2017].
Mitre (2017). Common Vulnerabilities and Exposures.
https://cve.mitre.org/. [Online; Accessed March
2017].
Moser, A., Kruegel, C., and Kirda, E. (2007). Exploring
multiple execution paths for malware analysis. In Se-
curity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 231–245. IEEE.
Patcha, A. and Park, J.-M. (2007). An overview of
anomaly detection techniques: Existing solutions
and latest technological trends. Computer networks,
51(12):3448–3470.
Ponomarev, S. and Atkison, T. (2016). Industrial control
system network intrusion detection by telemetry anal-
ysis. IEEE Transactions on Dependable and Secure
Computing, 13(2):252–260.
Rahimian, M. A. and Aghdam, A. G. (2013). Struc-
tural controllability of multi-agent networks: Ro-
bustness against simultaneous failures. Automatica,
49(11):3149–3157.
Sadeghi, A.-R., Wachsmann, C., and Waidner, M. (2015).
Security and privacy challenges in industrial internet
of things. In Proceedings of the 52Nd Annual Design
Automation Conference, DAC ’15, pages 54:1–54:6,
New York, NY, USA. ACM.
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A.,
Yang, H., and Zhou, S. (2002). Specification-based
anomaly detection: a new approach for detecting net-
work intrusions. In Proceedings of the 9th ACM con-
ference on Computer and communications security,
pages 265–274. ACM.
Sen, J. (2013). Security and privacy issues in cloud com-
puting. Architectures and Protocols for Secure Infor-
mation Technology Infrastructures, pages 1–45.
Siemens (2017). SIMATIC OPC UA.
http://www.industry.siemens.com/topics/global/en/tia-
portal/software/details/pages/opc-ua.aspx. [Online;
Accessed March 2017].
SIGA (2017). SIGA Guard. http://www.sigasec.com. [On-
line; Accessed March 2017].
Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., and Park,
J. H. (2016). A comprehensive study on apt attacks
and countermeasures for future networks and commu-
nications: challenges and solutions. The Journal of
Supercomputing, pages 1–32.
Stone, S. J., Temple, M. A., and Baldwin, R. O. (2015).
Detecting anomalous programmable logic controller
behavior using rf-based hilbert transform features and
a correlation-based verification process. International
Journal of Critical Infrastructure Protection, 9:41 –
51.
Sun, Y., Zhang, J., Xiong, Y., and Zhu, G. (2014). Data se-
curity and privacy in cloud computing. International
Journal of Distributed Sensor Networks.
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A.,
and Richardson, M. (2015). A security threat analy-
sis for the routing protocol for low-power and lossy
networks (rpls). Technical report.
Vern Paxson et al. (2017). The Bro Network Security Mon-
itor. https://www.bro.org/. [Online; Accessed March
2017].
Wallgren, L., Raza, S., and Voigt, T. (2013). Routing at-
tacks and countermeasures in the rpl-based internet of
things. International Journal of Distributed Sensor
Networks.
Wu, D., Rosen, D. W., Wang, L., and Schaefer, D.
(2015). Cloud-based design and manufacturing: A
Analysis of Intrusion Detection Systems in Industrial Ecosystems
127