From: EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Attack | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Time (EPASAD) | 0 | 10 | 3 | 16 | 12 | 16 | 32 | 18 | 0 | 0 | 10 | 18 | 4 | 10 |
Time (PASAD) | 0 | \(\times\) | 4 | 17 | 10 | 14 | 26 | \(\times\) | 22 | 0 | 10 | 52 | 4 | 17 |
Count (EPASAD) | 6 | 2 | 10 | 6 | 6 | 5 | 5 | 3 | 8 | 7 | 9 | 6 | 4 | 2 |
Count (PASAD) | 6 | 0 | 9 | 6 | 3 | 5 | 5 | 0 | 4 | 6 | 11 | 3 | 3 | 2 |