[go: up one dir, main page]

Yask et al., 2019 - Google Patents

A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors

Yask et al., 2019

Document ID
6338131958896733576
Author
Yask
Kumar B
Publication year
Publication venue
Journal of Discrete Mathematical Sciences and Cryptography

External Links

Snippet

This paper reviews the state of the art of field Malware Detection and Protection for the Distributed Control Systems particularly in Oil & Gas Sectors with a focus on industrial control system applications. This paper is reviewing the existing Malware Detection and …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Similar Documents

Publication Publication Date Title
US20240073242A1 (en) Cyber security appliance for an operational technology network
Zhou et al. A unified architectural approach for cyberattack-resilient industrial control systems
Lv et al. Trustworthiness in industrial IoT systems based on artificial intelligence
Asghar et al. Cybersecurity in industrial control systems: Issues, technologies, and challenges
El-Kady et al. Analysis of safety and security challenges and opportunities related to cyber-physical systems
Paridari et al. A framework for attack-resilient industrial control systems: Attack detection and controller reconfiguration
Rubio et al. Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Urbina et al. Survey and new directions for physics-based attack detection in control systems
Krotofil et al. Industrial control systems security: What is happening?
Alcaraz et al. Security aspects of SCADA and DCS environments
Tadepalli et al. Distributed control microgrids: Cyber-attack models, impacts and remedial strategies
CN111107108B (en) Method for analyzing network security of industrial control system
Alqurashi et al. On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
Settanni et al. Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
Liu et al. Detection and analysis of cybersecurity challenges for processing systems
Zhao et al. Multi-agent learning for resilient distributed control systems
Yask et al. A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors
Ocaka et al. Cybersecurity threats, vulnerabilities, mitigation measures in industrial control and automation systems: a technical review
Abshari et al. A Survey of Anomaly Detection in Cyber-Physical Systems
Aliyari Securing industrial infrastructure against cyber-attacks using machine learning and artificial intelligence at the age of industry 4.0
Mesbah et al. Cyber threats and policies for industrial control systems
Smidts et al. Next-generation architecture and autonomous cyber-defense
Al-Hawawreh et al. AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions
Manyfield-Donald et al. The current state of fingerprinting in operational technology environments
Yask et al. Construct the filter for malware detection in distributed control system