McQueen, M. A., Boyer, W. F., Flynn, M. A., and Beitel,
G. A. (2006). Time-to-compromise model for cyber
risk reduction estimation. In Gollmann, D., Massacci,
F., and Yautsiukhin, A., editors, Quality of Protection,
volume 23 of Advances in Information Security, pages
49–64. Springer US, Boston, MA.
Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., and
Payne, B. D. (2015). Evaluating computer intrusion
detection systems: A survey of common practices.
ACM Computing Surveys, 48(1):1–41.
Mitchell, R. and Chen, I.-R. (2014). A survey of intrusion
detection techniques for cyber-physical systems. ACM
Computing Surveys, 46(4):1–29.
Morris, T. and Gao, W. (2014). Industrial control system
traffic data sets for intrusion detection research. In
Butts, J. and Shenoi, S., editors, Critical Infrastruc-
ture Protection VIII, volume 441 of IFIP Advances in
Information and Communication Technology, pages
65–78. Springer Berlin Heidelberg, Berlin, Heidel-
berg.
Naedele, M. and Biderbost, O. (2004). Human-assisted in-
trusion detection for process control systems. In Pro-
ceedings of the Second International Conference on
Applied Cryptography and Network Security, pages
216–225. Citeseer.
Nivethan, J. and Papa, M. (2016). A scada intrusion de-
tection framework that incorporates process seman-
tics. In Trien, J. P., Prowell, S. J., Goodall, J. R., and
Bridges, R. A., editors, Proceedings of the 11th An-
nual Cyber and Information Security Research Con-
ference, pages 1–5. ACM.
Nzoukou, W., Wang, L., Jajodia, S., and Singhal, A. (2013).
A unified framework for measuring a network’s mean
time-to-compromise. In 2013 IEEE 32nd Interna-
tional Symposium on Reliable Distributed Systems
(SRDS), pages 215–224. IEEE.
Oryspayuli, O. D. (August 2006). What intrusion detection
approaches work well if only TCP/IP packet header
information is available? PhD thesis, Master Thesis,
Faculty of Electrical Engineering, Mathematics and
Computer Science, University of Twente, Enschede,
The Netherlands, Enschede, Netherlands.
Paxson, V. (1999). Bro: A system for detecting network
intruders in real-time. Computer Networks, 31(23-
24):2435–2463.
Paxson, V. (2007). Considerations and pitfalls for con-
ducting intrusion detection research: Keynote. In
Fourth GI International Conference on Detection of
Intrusions & Malware, and Vulnerability Assessment
(DIMVA).
Perkins, E., Contu, R., and Alaybeyi, S. B. (2017). Market
guide for operational technology security.
Ponomarev, S. and Atkison, T. (2016). Industrial control
system network intrusion detection by telemetry anal-
ysis. IEEE Transactions on Dependable and Secure
Computing, 13(2):252–260.
Puketza, N. J., Zhang, K., Chung, M., Mukherjee, B., and
Olsson, R. A. (1996). A methodology for testing in-
trusion detection systems. IEEE Transactions on Soft-
ware Engineering, 22(10):719–729.
Roesch, M. (1999). Snort - lightweight intrusion detection
for networks. In 13th USENIX Conference on System
Administration, LISA ’99, pages 229–238, Berkeley,
CA, USA. USENIX Association.
Servin, A. and Kudenko, D. (2008). Multi-agent rein-
forcement learning for intrusion detection. In Tuyls,
K., Nowe, A., Guessoum, Z., and Kudenko, D., ed-
itors, Adaptive Agents and Multi-Agent Systems III.
Adaptation and Multi-Agent Learning, volume 4865
of Lecture Notes in Computer Science, pages 211–
223. Springer Berlin Heidelberg, Berlin, Heidelberg.
Sommer, R. and Paxson, V. (2010). Outside the closed
world: On using machine learning for network intru-
sion detection. In 2010 IEEE Symposium on Security
and Privacy, pages 305–316. IEEE.
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., and
Hahn, A. (2015). Guide to Industrial Control Systems
(ICS) Security: Supervisory, Control and Data Ac-
quisition (SCADA) Systems, Distributed Control Sys-
tems (DCS) and Other Control System Configura-
tions such as Programmable Logic Controllers (PLC):
NIST Special Publication 800-82. National Institute
of Standards and Technology, revision 2 edition.
Tavallaee, M., Stakhanova, N., and Ghorbani, A. A.
(2010). Toward credible evaluation of anomaly-based
intrusion-detection methods. IEEE Transactions on
Systems, Man, and Cybernetics, Part C (Applications
and Reviews), 40(5):516–524.
Udd, R., Asplund, M., Nadjm-Tehrani, S., Kazemtabrizi,
M., and Ekstedt, M. (2016). Exploiting bro for in-
trusion detection in a scada system. In Zhou, J. and
Lopez, J., editors, the 2nd ACM International Work-
shop on Cyber-Physical System Security, pages 44–
51. ACM.
Valdes, A. and Cheung, S. (2009). Communication pattern
anomaly detection in process control systems. In 2009
IEEE Conference on Technologies for Homeland Se-
curity (HST), pages 22–29. IEEE.
Yang, Y., McLaughlin, K., Sezer, S., Yuan, Y. B., and
Huang, W. (2014). Stateful intrusion detection for iec
60870-5-104 scada security. In 2014 IEEE PES Gen-
eral Meeting, pages 1–5. IEEE.
Zarpel
˜
ao, B. B., Miani, R. S., Kawakani, C. T., and de Al-
varenga, S. C. (2017). A survey of intrusion detection
in internet of things. Journal of Network and Com-
puter Applications, 84:25–37.
Zhang, J., Gan, S., Liu, X., and Zhu, P. (2016). Intru-
sion detection in scada systems by traffic periodicity
and telemetry analysis. In 2016 IEEE Symposium on
Computers and Communication (ISCC), pages 318–
325. IEEE.
Zhu, B. and Sastry, S. (2010). Scada-specific intrusion de-
tection/prevention systems: a survey and taxonomy.
In Proceedings of the 1st Workshop on Secure Control
Systems (SCS), volume 11, pages 1–7.
Zhu, Q. and Basar, T. (2015). Game-theoretic methods for
robustness, security, and resilience of cyberphysical
control systems: Games-in-games principle for opti-
mal cross-layer resilient control systems. IEEE Con-
trol Systems, 35(1):46–65.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
210