Alcaraz et al., 2017 - Google Patents
Cyber-physical systems for wide-area situational awarenessAlcaraz et al., 2017
View PDF- Document ID
- 18056582621183478270
- Author
- Alcaraz C
- Cazorla L
- Lopez J
- Publication year
- Publication venue
- Cyber-Physical Systems
External Links
Snippet
Abstract Cyber-physical systems (CPSs), integrated in critical infrastructures, could provide the minimal services that traditional situational awareness (SA) systems demand. However, their application in SA solutions for the protection of large control distributions against …
- 230000004224 protection 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12363157B2 (en) | Cyber security appliance for an operational technology network | |
US11973774B2 (en) | Multi-stage anomaly detection for process chains in multi-host environments | |
Suaboot et al. | A taxonomy of supervised learning for idss in scada environments | |
Garitano et al. | A review of SCADA anomaly detection systems | |
Maleh | Machine learning techniques for IoT intrusions detection in aerospace cyber-physical systems | |
Iturbe et al. | Towards Large‐Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends | |
Alcaraz et al. | Cyber-physical systems for wide-area situational awareness | |
Ankitdeshpandey et al. | Development of intrusion detection system using deep learning for classifying attacks in power systems | |
Mahmoud et al. | Cloud control systems: analysis, design and estimation | |
Efiong et al. | CyberSCADA network security analysis model for intrusion detection systems in the smart grid | |
Hentea | Intelligent system for information security management: Architecture and design issues. | |
Ji et al. | Review of intrusion detection system in cyber‐physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges | |
Lysenko et al. | Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization | |
MacDermott et al. | Intrusion detection for critical infrastructure protection | |
Chiang et al. | Risk and vulnerability assessment of secure autonomic communication networks | |
Sundararajan et al. | A tri-modular framework to minimize smart grid cyber-attack cognitive gap in utility control centers | |
Mejdi et al. | A comprehensive survey on game theory applications in cyber-physical system security: attack models, security analyses, and machine learning classifications | |
Sagar et al. | Attacks on Cyber Physical System: Comprehensive Review and Challenges | |
Patel et al. | Cloud-based autonomic computing framework for securing SCADA systems | |
Mani et al. | Machine learning models to enhance the science of cognitive autonomy | |
Mani et al. | Autonomous Aggregate Data Analytics in Untrusted Cloud. | |
Rouff et al. | Sok: Autonomic computing based mehods for ICS/SCADA and iiot security | |
Saikia et al. | MaNaDAC: An effective alert correlation method | |
Agzayal et al. | AI-Driven Cyber Risk Management Framework | |
Isaza et al. | Intrusion correlation using ontologies and multi-agent systems |