Yask et al., 2019 - Google Patents
A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectorsYask et al., 2019
- Document ID
- 6338131958896733576
- Author
- Yask
- Kumar B
- Publication year
- Publication venue
- Journal of Discrete Mathematical Sciences and Cryptography
External Links
Snippet
This paper reviews the state of the art of field Malware Detection and Protection for the Distributed Control Systems particularly in Oil & Gas Sectors with a focus on industrial control system applications. This paper is reviewing the existing Malware Detection and …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240073242A1 (en) | Cyber security appliance for an operational technology network | |
Zhou et al. | A unified architectural approach for cyberattack-resilient industrial control systems | |
Lv et al. | Trustworthiness in industrial IoT systems based on artificial intelligence | |
Asghar et al. | Cybersecurity in industrial control systems: Issues, technologies, and challenges | |
El-Kady et al. | Analysis of safety and security challenges and opportunities related to cyber-physical systems | |
Paridari et al. | A framework for attack-resilient industrial control systems: Attack detection and controller reconfiguration | |
Rubio et al. | Analysis of Intrusion Detection Systems in Industrial Ecosystems. | |
Urbina et al. | Survey and new directions for physics-based attack detection in control systems | |
Krotofil et al. | Industrial control systems security: What is happening? | |
Alcaraz et al. | Security aspects of SCADA and DCS environments | |
Tadepalli et al. | Distributed control microgrids: Cyber-attack models, impacts and remedial strategies | |
CN111107108B (en) | Method for analyzing network security of industrial control system | |
Alqurashi et al. | On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks | |
Settanni et al. | Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems. | |
Liu et al. | Detection and analysis of cybersecurity challenges for processing systems | |
Zhao et al. | Multi-agent learning for resilient distributed control systems | |
Yask et al. | A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors | |
Ocaka et al. | Cybersecurity threats, vulnerabilities, mitigation measures in industrial control and automation systems: a technical review | |
Abshari et al. | A Survey of Anomaly Detection in Cyber-Physical Systems | |
Aliyari | Securing industrial infrastructure against cyber-attacks using machine learning and artificial intelligence at the age of industry 4.0 | |
Mesbah et al. | Cyber threats and policies for industrial control systems | |
Smidts et al. | Next-generation architecture and autonomous cyber-defense | |
Al-Hawawreh et al. | AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions | |
Manyfield-Donald et al. | The current state of fingerprinting in operational technology environments | |
Yask et al. | Construct the filter for malware detection in distributed control system |