Edeh, NatashaAltschaffel, RobertWaedt, KarlKlein, MaikeKrupka, DanielWinter, CorneliaWohlgemuth, Volker2023-11-292023-11-292023978-3-88579-731-9https://dl.gi.de/handle/20.500.12116/43134ISO/IEC 27002:2022 distinguishes between the following types of security controls corrective: preventive, detective and corrective. The focus of this paper is on the support for testing of detective security controls for Industrial Automation and Control Systems. More specifically we will only address the generation of synthetic data that can be used for the detection of selected, advanced detective security controls. The proposed approach will be justified, while a comprehensive validation of the effectiveness of the synthetic data is beyond the scope of this paper. This work aims to contribute to the comprehension and improvement of security measures in Industrial Automation and Control Systems by focusing on the development of synthetic data and its consequences for the identification of specific detective security controls.enStego-MalwareInter-ZoneSynthetic dataIACSIACS protocolsGeneration of Plausible Synthetic Data for Stego-Malware Detection for Inter-zone IACS ProtocolsText/Conference Paper10.18420/inf2023_2031617-5468