Filters








314 Hits in 2.5 sec

Safeguarding SCADA Systems with Anomaly Detection [chapter]

John Bigham, David Gamez, Ning Lu
2003 Lecture Notes in Computer Science  
systems using anomaly detection.  ...  This paper will show how the accuracy and security of SCADA systems can be improved by using anomaly detection to identify bad values caused by attacks and faults.  ...  Acknowledgements We would like to acknowledge Xuan Jin and the other members of the Safeguard project.  ... 
doi:10.1007/978-3-540-45215-7_14 fatcat:4ahsxtnq2jcozjf6aj6ozbyfk4

Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining [chapter]

Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo
2016 Lecture Notes in Computer Science  
This anomaly detection would be useful for intrusion detection or erroneous behaviour of a system.  ...  As anomalous events occur rarely in a system and SCADA systems' topology and actions do not change often, we argue that some anomalies can be detected using rare sequential pattern mining.  ...  Introduction Anomaly detection is one step of several safeguarding measures applied in critical infrastructure (CI) control networks, such as supervisory control and data acquisition (SCADA).  ... 
doi:10.1007/978-3-319-46298-1_32 fatcat:ndvwvk4gabecdg5zzdeswveaqy

Forensics in Industrial Control System: A Case Study [chapter]

Pieter Van Vliet, M.-T. Kechadi, Nhien-An Le-Khac
2016 Lecture Notes in Computer Science  
Data Acquisition (SCADA) system(s) in a nuclear power plant.  ...  In this paper we present a case study of forensics in ICS where we describe a method of safeguarding important volatile artefacts from an embedded industrial control system and several other sources.  ...  Barbosa [2] described Anomaly Detection in SCADA Systems, A Network Based Approach.  ... 
doi:10.1007/978-3-319-40385-4_10 fatcat:5jwwe57ocna3pivms5rbiv2jq4

Forensics in Industrial Control System: A Case Study [article]

Pieter Van Vliet and M-T. Kechadi and Nhien-An Le-Khac
2016 arXiv   pre-print
Data Acquisition (SCADA) system(s) in a nuclear power plant.  ...  In this paper we present a case study of forensics in ICS where we de-scribe a method of safeguarding important volatile artefacts from an embedded industrial control system and several other sources  ...  Barbosa [2] described Anomaly Detection in SCADA Systems, A Network Based Approach.  ... 
arXiv:1611.01754v1 fatcat:lbetrz3eyrga5pkgezxzliq42i

Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm

Sangeetha K., Shitharth S., Gouse Baig Mohammed
2022 International Journal of Web-Based Learning and Teaching Technologies  
In case, if any of the MD values significantly varies from the rest then it is declared as anomaly nodes.  ...  The first one is by calculating the median distance (MD) between each node with its neighbor nodes. Then those median values are compared with one another.  ...  Then as a further improvement, it would be tested with the SCADA firewall for improved intrusion detection.  ... 
doi:10.4018/ijwltt.20220301.oa2 fatcat:2tze2luiqrerfdqxszpwcuywoi

A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

Slavica V. Bostjancic Rakas, Mirjana D. Stojanovic, Jasna D. Markovic-Petrovic
2020 IEEE Access  
INDEX TERMS Anomaly-based detection, network security, SCADA, signature-based detection, specification-based detection.  ...  Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control and data acquisition (SCADA) systems due to their architecture, stringent real-time requirements, network traffic  ...  Garitano et al. provided an overview of anomaly-based detection systems for SCADA networks [24] .  ... 
doi:10.1109/access.2020.2994961 fatcat:pid6aq5t7be7hkf4moaym2wqti

Vulnerability Assessment of Asphalt Plant through Machine Learning Techniques

Abid Haider, Sarmadullah Khan, Abdullah Mohamed, Shahbaz Khan, Razaullah Khan, Hafiz Tayyab Rauf
2022 Mobile Information Systems  
., SVM, KNN, and random forest, are tested to cover the anomaly detection along with security protection for SCADA systems.  ...  Conventional security systems including different antivirus software and firewalls are unable to safeguard SCADA systems as they are of distinct requirements.  ...  The lack of adequate modelling tools to assess the privacy of the SCADA system is a major issue in the study and innovation of intrusion detection systems for the SCADA system.  ... 
doi:10.1155/2022/9496123 fatcat:jbmho2t5qnf7dopqh23xpfedn4

Security Aspects of SCADA and DCS Environments [chapter]

Cristina Alcaraz, Gerardo Fernandez, Fernando Carvajal
2012 Lecture Notes in Computer Science  
Therefore, the main purpose of this Chapter is to address these issues and to analyze the interdependencies of Process Control Systems with ICT systems, to discuss some security aspects and to offer some  ...  SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected.  ...  This is the case with the work presented in [56] where a neural network schema is used as an anomaly detection mechanism for the intrusion detection.  ... 
doi:10.1007/978-3-642-28920-0_7 fatcat:luqylx5uybhlrbjam334hdlhgm

Anomaly Detection in Liquid Pipelines Using Modeling, Co-Simulation and Dynamical Estimation [chapter]

Saed Alajlouni, Vittal Rao
2013 IFIP Advances in Information and Communication Technology  
Historically, supervisory control and data acquisition (SCADA) systems have relied on obscurity to safeguard against attacks.  ...  A generic water pipeline system is modeled using state space equations, and a discrete-time Kalman filter is used to estimate operational characteristics for anomaly-based intrusion detection.  ...  Anomaly Detection Statistical methods have been used very effectively to detect anomalies in dynamical systems. For example, Cardenas, et al.  ... 
doi:10.1007/978-3-642-45330-4_8 fatcat:cjqd6rvl4vdvzg72qdfjeqsgvi

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems

Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz
2016 Journal of Information Security and Applications  
By sending an explicit message for every anomaly detected, the intrusion detection mechanism will flood the medium with messages that will cause a delay in the communication between entities in the SCADA  ...  The presence of a real time intrusion detection mechanism, which can cope with different types of attacks, is of great importance, in order to defend a system against cyber attacks This defense mechanism  ...  IT-OCSVM detection mechanism The main purpose of the IT-OCSVM detection mechanism is to perform anomaly detection in a time-efficient way, with good accuracy and low overhead, within a temporal window  ... 
doi:10.1016/j.jisa.2016.04.002 fatcat:drvycqpujbhk7cul4x2rud7pxe

Omni SCADA Intrusion Detection Using Deep Learning Algorithms [article]

Jun Gao, Luyun Gan, Fabiola Buschendorf, Liao Zhang, Hua Liu, Peixue Li, Xiaodai Dong, Tao Lu
2019 arXiv   pre-print
We investigate deep learning based omni intrusion detection system (IDS) for supervisory control and data acquisition (SCADA) networks that are capable of detecting both temporally uncorrelated and correlated  ...  Combining LSTM and FNN through an ensemble approach further improves the IDS performance with F_1 of 99.68±0.04% regardless the temporal correlations among the data packets.  ...  To safeguard SCADA networks, an intrusion detection system (IDS) needs to be implemented. IDS can be signaturebased or anomaly-based.  ... 
arXiv:1908.01974v1 fatcat:gvgtzbqm7baclj5cl4mpubugd4

Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach

Marcio Andrey Teixeira, Maede Zolanvari, Khaled M. Khan, Raj Jain, Nader Meskin
2021 IET Cyber-Physical Systems  
Moreover, a flow-based intrusion detection system (IDS) is developed for SCADA systems using a deep learning algorithm.  ...  Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries.  ...  Therefore, it is vital to develop new security mechanisms to safeguard ICSs, and in our case, the SCADA systems. | Our prior work In Teixeira et al.  ... 
doi:10.1049/cps2.12016 fatcat:4645mwfw6zb77pyarpu3h6qz4u

Intrusion detection in SCADA systems using machine learning techniques

Leandros A. Maglaras, Jianmin Jiang
2014 2014 Science and Information Conference  
There has also been considerable amount of work regarding SCADA intrusion and anomaly detection, including Intrusion Detection Systems (IDS) [14] , device-level anomaly detection and classification [  ...  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4):1690-1700, 2014. [48] Mohiuddin Ahmed and Abdun Naser Mahmood.  ... 
doi:10.1109/sai.2014.6918252 fatcat:4ueepuwxezehxknf44kv4q23o4

Autonomic computing meets SCADA security

Sajid Nazir, Shushma Patel, Dilip Patel
2017 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)  
This paper provides a brief review of autonomic computing applications for SCADA systems and proposes architecture for cyber security.  ...  The autonomic computing paradigm mimics the autonomic nervous system and is promising to meet the latest challenges in the cyber threat landscape.  ...  Such unsupervised anomaly detection schemes are more appropriate and efficient compared to human analysts [18] and other signature based approaches [9] .  ... 
doi:10.1109/icci-cc.2017.8109795 dblp:conf/IEEEicci/NazirPP17 fatcat:2w5ab34kdne2jcpnczavnxctpi

Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems [article]

Leandros A. Maglaras, Jianmin Jiang, Tiago J. Cruz
2015 arXiv   pre-print
The presence of a real time intrusion detection mechanism, which can cope with different types of attacks, is of great importance, in order to defend a system against cyber attacks This defense mechanism  ...  Recently an integrated detection mechanism, namely IT-OCSVM was proposed, which is distributed in a SCADA network as a part of a distributed intrusion detection system (IDS), providing accurate data about  ...  IT-OCSVM detection mechanism The main purpose of the IT-OCSVM detection mechanism is to perform anomaly detection in a time-efficient way, with good accuracy and low overhead, within a temporal window  ... 
arXiv:1507.02825v2 fatcat:los2xqsmrzdijkg5xrfkxbwfxm
« Previous Showing results 1 — 15 out of 314 results