Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: ReScience/articles
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: b70bcdc
Choose a base ref
...
head repository: ReScience/articles
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: ec2b4c9
Choose a head ref
  • 3 commits
  • 3 files changed
  • 1 contributor

Commits on Mar 22, 2022

  1. Copy the full SHA
    5aea3b9 View commit details

Commits on Mar 24, 2022

  1. Copy the full SHA
    2272746 View commit details
  2. Copy the full SHA
    ec2b4c9 View commit details
Showing with 155 additions and 0 deletions.
  1. +22 −0 10.5281_zenodo.6375751/article.bib
  2. BIN 10.5281_zenodo.6375751/article.pdf
  3. +133 −0 10.5281_zenodo.6375751/article.yaml
22 changes: 22 additions & 0 deletions 10.5281_zenodo.6375751/article.bib
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
@Article {Raj:2022,
author = {Rahul Raj},
title = {{[Re] Process Aware Stealthy Attack Detection in Industrial Control Systems}},
journal = {ReScience C},
year = {2022},
month = {1},
volume = {7},
number = {4},
pages = {{#5}},
doi = {10.5281/zenodo.6375751},
url = {https://zenodo.org/record/6375751/files/article.pdf},
code_url = {https://github.com/rahulrajpl/PyPASAD},
code_doi = {},
code_swh = {},
data_url = {},
data_doi = {},
review_url = {https://github.com/ReScience/submissions/issues/17},
type = {Replication},
language = {Python},
domain = {Cyber security},
keywords = {rescience c, Python}
}
Binary file added 10.5281_zenodo.6375751/article.pdf
Binary file not shown.
133 changes: 133 additions & 0 deletions 10.5281_zenodo.6375751/article.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,133 @@
# To be filled by the author(s) at the time of submission
# -------------------------------------------------------

# Title of the article:
# - For a successful replication, it shoudl be prefixed with "[Re]"
# - For a failed replication, it should be prefixed with "[¬Re]"
# - For other article types, no instruction (but please, not too long)
title: "[Re] Process Aware Stealthy Attack Detection in Industrial Control Systems"

# List of authors with name, orcid number, email and affiliation
# Affiliation "*" means contact author
authors:
- name: Rahul Raj
orcid: 0000-0002-9049-1055
email: rahulr@cse.iitk.ac.in
affiliations: 1,*

# - name: Charan
# orcid: 0000-0002-6972-589X
# email: Nicolas.Rougier@inria.fr
# affiliations: # * is for contact author


# List of affiliations with code (corresponding to author affiliations), name
# and address. You can also use these affiliations to add text such as "Equal
# contributions" as name (with no address).
affiliations:
- code: 1
name: Indian Institute of Technology, Kanpur
address: Uttar Pradesh (UP), India

# - code: 2
# name: Synchrotron SOLEIL, Division Expériences
# address: Gif sur Yvette, France

# - code: 3
# name: INRIA Bordeaux Sud-Ouest
# address: Bordeaux, France

# - code: 4
# name: LaBRI, Université de Bordeaux, Institut Polytechnique de Bordeaux,
# Centre National de la Recherche Scientifique, UMR 5800
# address: Talence, France

# - code: 5
# name: Institut des Maladies Neurodégénératives, Université de Bordeaux,
# Centre National de la Recherche Scientifique, UMR 5293
# # address: Bordeaux, France


# List of keywords (adding the programming language might be a good idea)
keywords: python, matplotlib, time series analysis, Intrusion Detection, cybersecurity

# Code URL and DOI/SWH (url is mandatory for replication, doi after acceptance)
# You can get a DOI for your code from Zenodo, or an SWH identifier from
# Software Heritage.
# see https://guides.github.com/activities/citable-code/
code:
- url: https://github.com/rahulrajpl/PyPASAD
- doi:
- swh:

# Data URL and DOI (optional if no data)
data:
- url:
- doi:

# Information about the original article that has been replicated
replication:
- cite: "Wissam Aoudi, Mikel Iturbe, and Magnus Almgren. 2018. Truth Will Out:
Departure-Based Process-Level Detection of Stealthy Attacks on Control
Systems. In 2018 ACM SIGSAC Conference on Computer and Communications
Security (CCS ’18), October 15–19, 2018, Toronto, ON, Canada. ACM, New
York, NY, USA, 15 pages. https://doi.org/10.1145/3243734.3243781"# Full textual citation
- bib: # Bibtex key (if any) in your bibliography file
- url: https://zenodo.org/record/5932598/files/article.pdf # URL to the PDF, try to link to a non-paywall version
- doi: 10.5281/zenodo.5932598 # Regular digital object identifier

# Don't forget to surround abstract with double quotes
abstract: "Although the traditional IT security layer provided to Industrial Control Systems offers a great deal of protection, security managers often overlook the possibility of a potential stealthy attacks at the process level. In the paper, \"Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems\" the authors bring out a novel approach to detecting stealthy attacks on the control system through a process-aware methodology which they call - PASAD. It enables early detection in the subtle variation of process behavior, thus averting strategic adversaries from maliciously manipulating the industrial process within the noise level. The original implementation for the PASAD algorithm was in Matlab. In this replication, I use Python, and popular visualization library, Matplotlib, to obtain the results claimed."

# Bibliography file (yours)
bibliography: bibliography.bib

# Type of the article
# Type can be:
# * Editorial
# * Letter
# * Replication
type: Reproduction

# Scientific domain of the article (e.g. Computational Neuroscience)
# (one domain only & try to be not overly specific)
domain: Cybersecurity for Critical Infrastructure

# Coding language (main one only if several)
language: Python


# To be filled by the author(s) after acceptance
# -----------------------------------------------------------------------------

# For example, the URL of the GitHub issue where review actually occured
review:
- url: https://github.com/ReScience/submissions/issues/17

contributors:
- name: Etienne B. Roesch
orcid: https://orcid.org/0000-0002-8913-4173
role: editor
- name: Jaime Arias
role: reviewer
- name: Gabriel Netz
role: reviewer

# This information will be provided by the editor
dates:
- received: February 16, 2018
- accepted: January 18, 2022
- published: January

# This information will be provided by the editor
article:
- number: 4 # Article number will be automatically assigned during publication
- doi: 10.5281/zenodo.6375751 # DOI from Zenodo
- url: https://zenodo.org/record/6375751/files/article.pdf # Final PDF URL (Zenodo or rescience website?)

# This information will be provided by the editor
journal:
- name: "ReScience C"
- issn: 2430-3658
- volume: 7
- issue: 1