Next Article in Journal
A Persona-Based Approach for Identifying Accessibility Issues in Elderly and Disabled Users’ Interaction with Home Appliances
Next Article in Special Issue
Cyber Ranges and TestBeds for Education, Training, and Research
Previous Article in Journal
Effect of Impact Velocity, Flooring Material, and Trochanteric Soft-Tissue Quality on Acetabular Fracture during a Sideways Fall: A Parametric Finite Element Approach
Previous Article in Special Issue
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
 
 
Article
Peer-Review Record

Detecting Vulnerabilities in Critical Infrastructures by Classifying Exposed Industrial Control Systems Using Deep Learning

Appl. Sci. 2021, 11(1), 367; https://doi.org/10.3390/app11010367
by Pablo Blanco-Medina 1,2,*, Eduardo Fidalgo 1,2, Enrique Alegre 1,2, Roberto A. Vasco-Carofilis 1,2, Francisco Jañez-Martino 1,2 and Victor Fidalgo Villar 2
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Appl. Sci. 2021, 11(1), 367; https://doi.org/10.3390/app11010367
Submission received: 29 November 2020 / Revised: 24 December 2020 / Accepted: 28 December 2020 / Published: 1 January 2021
(This article belongs to the Special Issue Cyber Security of Critical Infrastructures)

Round 1

Reviewer 1 Report

In order to examine the exposure of industrial control systems, the author conducted a study to automatically classify screenshots of open ports and devices exposed to the outside through OSINT sources. The author proposed a pipeline based on Deep Learning to classify snapshots of images into 3 categories, IT, OT, and Others. Image classification models were trained using CNN, one of the deep learning models. The 18 pipelines were evaluated with 337 images crawled by Shodan.
The proposed method is necessary because the risk of cyber-attacks is increasing these days. However, it has the following problems.

1. The problem to be solved in this paper is not clear.
The paper analyzed the experimental results by applying several existing techniques. However, there is a mention that a new method is proposed in the introduction. So the problem to solve this paper is not clear. The author needs to clarify whether this paper focused on proposing a novel method or applying a proper existing model.
2. A detailed description of the proposed technique is needed.
The author used Transfer Learning with several classifiers. Each of them is already used in various fields. It is necessary to emphasize what the authors proposed.
3. 337 images are used for validating the performances of pipelines. Since the amount of data is too little, the author should be mentioned the reason why it is sufficient for training and testing.

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Reviewer 2 Report

See the attachment.

Comments for author File: Comments.pdf

Author Response

Please see the attachment

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

It seems to have been modified enough to be published.

Back to TopTop