[go: up one dir, main page]

Yang et al., 2006 - Google Patents

Anomaly-based intrusion detection for SCADA systems

Yang et al., 2006

View PDF
Document ID
16030939953901251757
Author
Yang D
Usynin A
Hines J
Publication year
Publication venue
5th intl. topical meeting on nuclear plant instrumentation, control and human machine interface technologies (npic&hmit 05)

External Links

Snippet

Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA). These systems have been the focus of …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Yang et al. Anomaly-based intrusion detection for SCADA systems
Kalech Cyber-attack detection in SCADA systems using temporal pattern recognition techniques
Chong et al. A tutorial introduction to security and privacy for cyber-physical systems
Zhang et al. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data
Huang et al. Assessing the physical impact of cyberattacks on industrial cyber-physical systems
Ye et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems
Salem et al. A survey of insider attack detection research
Biermann et al. A comparison of intrusion detection systems
Lin et al. Cyber attack and defense on industry control systems
Garitano et al. A review of SCADA anomaly detection systems
Jardine et al. Senami: Selective non-invasive active monitoring for ics intrusion detection
Sheng et al. A cyber-physical model for SCADA system and its intrusion detection
Carver et al. An intrusion response taxonomy and its role in automatic intrusion response
Yu A survey of anomaly intrusion detection techniques
Osareh et al. Intrusion detection in computer networks based on machine learning algorithms
Zhang et al. Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis
CN118101250A (en) Network security detection method and system
Yadav et al. Assessment of SCADA system vulnerabilities
Li et al. Uncertainty and risk management in cyber situational awareness
Ali Cybersecurity management for distributed control system: systematic approach
Eid et al. IIoT network intrusion detection using machine learning
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Tukur et al. Ethereum blockchain-based solution to insider threats on perception layer of IoT systems
CN117978416A (en) Construction method and system for production control large-area security situation awareness platform
König et al. Cascading Threats in Critical Infrastructures with Control Systems.