Yang et al., 2006 - Google Patents
Anomaly-based intrusion detection for SCADA systemsYang et al., 2006
View PDF- Document ID
- 16030939953901251757
- Author
- Yang D
- Usynin A
- Hines J
- Publication year
- Publication venue
- 5th intl. topical meeting on nuclear plant instrumentation, control and human machine interface technologies (npic&hmit 05)
External Links
Snippet
Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA). These systems have been the focus of …
- 238000001514 detection method 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Anomaly-based intrusion detection for SCADA systems | |
Kalech | Cyber-attack detection in SCADA systems using temporal pattern recognition techniques | |
Chong et al. | A tutorial introduction to security and privacy for cyber-physical systems | |
Zhang et al. | Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data | |
Huang et al. | Assessing the physical impact of cyberattacks on industrial cyber-physical systems | |
Ye et al. | An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems | |
Salem et al. | A survey of insider attack detection research | |
Biermann et al. | A comparison of intrusion detection systems | |
Lin et al. | Cyber attack and defense on industry control systems | |
Garitano et al. | A review of SCADA anomaly detection systems | |
Jardine et al. | Senami: Selective non-invasive active monitoring for ics intrusion detection | |
Sheng et al. | A cyber-physical model for SCADA system and its intrusion detection | |
Carver et al. | An intrusion response taxonomy and its role in automatic intrusion response | |
Yu | A survey of anomaly intrusion detection techniques | |
Osareh et al. | Intrusion detection in computer networks based on machine learning algorithms | |
Zhang et al. | Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis | |
CN118101250A (en) | Network security detection method and system | |
Yadav et al. | Assessment of SCADA system vulnerabilities | |
Li et al. | Uncertainty and risk management in cyber situational awareness | |
Ali | Cybersecurity management for distributed control system: systematic approach | |
Eid et al. | IIoT network intrusion detection using machine learning | |
Liu et al. | SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering | |
Tukur et al. | Ethereum blockchain-based solution to insider threats on perception layer of IoT systems | |
CN117978416A (en) | Construction method and system for production control large-area security situation awareness platform | |
König et al. | Cascading Threats in Critical Infrastructures with Control Systems. |