Close menu

SURE

Sunderland Repository records the research produced by the University of Sunderland including practice-based research and theses.

LOTL-Hunter: Detecting Multi-Stage Living-off-the-Land Attacks in Cyber-Physical Systems using Decision Fusion Techniques with Digital Twins

Lo, Carol, Win, Thu Yein, Rezaeifar, Zeinab, Khan, Zaheer and Legg, Phil (2026) LOTL-Hunter: Detecting Multi-Stage Living-off-the-Land Attacks in Cyber-Physical Systems using Decision Fusion Techniques with Digital Twins. Future Generation Computer Systems, 51. p. 108382. ISSN 0167739X

Item Type: Article

Abstract

The integration of smart sensors and actuators in industrial environments has expanded the cyber-physical attack surface, making it increasingly difficult to distinguish anomalies caused by cyberattacks from those due to mechanical or electrical faults. This challenge is exacerbated by stealthy, multi-stage attacks leveraging Living off the Land (LOTL) techniques, which often evade conventional anomaly detection or intrusion detection systems (IDS).
This study presents a Digital Twin-based testbed for safe, repeatable simulation of multi-stage cyber-physical attacks targeting Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS). We propose a two-level decision fusion method that aggregates and aligns anomalies across network, process, and host domains in synchronized 1-minute intervals. The first-level fusion improves OT-layer detection by applying confidence-aware decision logic to outputs combined from (a) a supervised deep learning model (LSTM-FCN) for process anomalies, (b) an unsupervised model (Isolation Forest) for OPC UA network anomalies, and (c) process alarm signals. The second-level fusion integrates these results with host-based anomalies, computed through point-based scoring of Wazuh alerts, to provide comprehensive IT/OT situational awareness. Experimental results demonstrate improved detection of stealthy, multi-stage APT attack behaviours. Additionally, Large Language Models (LLM) provide summarization of the integrated IT/OT anomaly logs into human-readable insights, enhancing interpretability and supporting cyber threat hunting.

[thumbnail of 1-s2.0-S0167739X26000166-main.pdf]
Preview
PDF
1-s2.0-S0167739X26000166-main.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (13MB) | Preview

More Information

Additional Information: ** Article version: AM ** From Elsevier via Jisc Publications Router ** History: issued 20-01-2026. ** Licence for AM version of this article starting on 19-01-2026: http://creativecommons.org/licenses/by-nc-nd/4.0/
Related URLs:
SWORD Depositor: Publication Router
Depositing User: Publication Router

Identifiers

Item ID: 19869
Identification Number: 10.1016/j.future.2026.108382
ISSN: 0167739X
URI: https://sure.sunderland.ac.uk/id/eprint/19869

Users with ORCIDS

ORCID for Carol Lo: ORCID iD orcid.org/0009-0009-8375-7474
ORCID for Thu Yein Win: ORCID iD orcid.org/0000-0002-4977-0511

Catalogue record

Date Deposited: 18 Feb 2026 11:49
Last Modified: 18 Feb 2026 11:49

Contributors

Author: Carol Lo ORCID iD
Author: Thu Yein Win ORCID iD
Author: Zeinab Rezaeifar
Author: Zaheer Khan
Author: Phil Legg

University Divisions

Faculty of Business and Technology > School of Computer Science and Engineering

Subjects

Computing > Cybersecurity
Computing

Actions (login required)

View Item (Repository Staff Only) View Item (Repository Staff Only)

Downloads per month over past year