LOTL-Hunter: Detecting Multi-Stage Living-off-the-Land Attacks in Cyber-Physical Systems using Decision Fusion Techniques with Digital Twins
Lo, Carol, Win, Thu Yein, Rezaeifar, Zeinab, Khan, Zaheer and Legg, Phil (2026) LOTL-Hunter: Detecting Multi-Stage Living-off-the-Land Attacks in Cyber-Physical Systems using Decision Fusion Techniques with Digital Twins. Future Generation Computer Systems, 51. p. 108382. ISSN 0167739X
| Item Type: | Article |
|---|
Abstract
The integration of smart sensors and actuators in industrial environments has expanded the cyber-physical attack surface, making it increasingly difficult to distinguish anomalies caused by cyberattacks from those due to mechanical or electrical faults. This challenge is exacerbated by stealthy, multi-stage attacks leveraging Living off the Land (LOTL) techniques, which often evade conventional anomaly detection or intrusion detection systems (IDS).
This study presents a Digital Twin-based testbed for safe, repeatable simulation of multi-stage cyber-physical attacks targeting Cyber-Physical Systems (CPS) and Industrial Control Systems (ICS). We propose a two-level decision fusion method that aggregates and aligns anomalies across network, process, and host domains in synchronized 1-minute intervals. The first-level fusion improves OT-layer detection by applying confidence-aware decision logic to outputs combined from (a) a supervised deep learning model (LSTM-FCN) for process anomalies, (b) an unsupervised model (Isolation Forest) for OPC UA network anomalies, and (c) process alarm signals. The second-level fusion integrates these results with host-based anomalies, computed through point-based scoring of Wazuh alerts, to provide comprehensive IT/OT situational awareness. Experimental results demonstrate improved detection of stealthy, multi-stage APT attack behaviours. Additionally, Large Language Models (LLM) provide summarization of the integrated IT/OT anomaly logs into human-readable insights, enhancing interpretability and supporting cyber threat hunting.
Preview |
PDF
1-s2.0-S0167739X26000166-main.pdf - Published Version Available under License Creative Commons Attribution Non-commercial No Derivatives. Download (13MB) | Preview |
More Information
| Additional Information: ** Article version: AM ** From Elsevier via Jisc Publications Router ** History: issued 20-01-2026. ** Licence for AM version of this article starting on 19-01-2026: http://creativecommons.org/licenses/by-nc-nd/4.0/ |
| Related URLs: |
| SWORD Depositor: Publication Router |
| Depositing User: Publication Router |
Identifiers
| Item ID: 19869 |
| Identification Number: 10.1016/j.future.2026.108382 |
| ISSN: 0167739X |
| URI: https://sure.sunderland.ac.uk/id/eprint/19869 |
Users with ORCIDS
Catalogue record
| Date Deposited: 18 Feb 2026 11:49 |
| Last Modified: 18 Feb 2026 11:49 |
| Author: |
Carol Lo
|
| Author: |
Thu Yein Win
|
| Author: | Zeinab Rezaeifar |
| Author: | Zaheer Khan |
| Author: | Phil Legg |
University Divisions
Faculty of Business and Technology > School of Computer Science and EngineeringSubjects
Computing > CybersecurityComputing
Actions (login required)
![]() |
View Item (Repository Staff Only) |


Dimensions
Dimensions