CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner

SESSION

09/22 15:45 - 16:15 AI Security Forum

Detect industrial control system security over HMI image process

While ICS owners know that security solutions are imperative and there are many brilliant solutions to detect and prevent cyber intrusion. But among of those products, most of them majorly work base on Ethernet. In real world, we still can find amount of system working over fieldbus, even in critical infrastructure. A study of market shares 2021 according to HMS Networks shows that fieldbus still has 28% market share comparing with Ethernet and wireless. This highlight the important of security solution for these system.

This research will be targeting Windows base HMI. The concept of research including using image process and machine learning technique, finding the relation of figures and graphs to detect system security. In addition, we will share how we build our system and demo how the system work, we also propose strategies for mitigation of cyber intrusion.

LOCATION Taipei Nangang Exhibition Center, Hall 2 7F 701D LANGUAGE English
SESSION TOPIC ICS/SCADA SecurityIntrusion DetectionMachine Learning

SPEAKER

Yenting Lee
TXOne Networks Sr. Threat Researcher

Yenting Lee is a Sr. Threat Researcher at TXOne Networks, blending a background and experience in ICS / SCADA, cyber-offensive and defensive exercises, pentest and threat hunt. Yenting has been a speaker at several cyber security conferences and classes, including FIRST Conference, ICS Cyber Security Conference USA / APAC, CYBERSEC, SECCON, PPAM India, and InfoSec Taiwan. Additionally, he also had been engaged serveral ICS vulnerability discovery and white paper writing on the topics of ICS.

Patrick Kuo
TXOne Networks Senior Threat Researcher

Patrick Kuo is currently working at TXOne Networks in vulnerability research and technical development. His main responsibilities include analyzing network traffic, malicious programs, and developing Hunting Systems, Hunting Agents, and Threat Atlas to obtain the most up-to-date attack intelligence. In addition, he has spoken at BlackHat Europe, FIRST, CYBERSEC, and HITCON.