Kaouk et al., 2019 - Google Patents
A review of intrusion detection systems for industrial control systemsKaouk et al., 2019
- Document ID
- 6724588324287575024
- Author
- Kaouk M
- Flaus J
- Potet M
- Groz R
- Publication year
- Publication venue
- 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)
External Links
Snippet
Industrial Control Systems are found often in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has gained much attention as these systems now exhibit an increased interaction with the …
- 238000001514 detection method 0 title abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kaouk et al. | A review of intrusion detection systems for industrial control systems | |
Feng et al. | Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks | |
Khan et al. | HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems | |
Hu et al. | A survey of intrusion detection on industrial control systems | |
Suaboot et al. | A taxonomy of supervised learning for idss in scada environments | |
Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
Ayodeji et al. | A new perspective towards the development of robust data-driven intrusion detection for industrial control systems | |
CN115996146B (en) | Numerical control system security situation sensing and analyzing system, method, equipment and terminal | |
Clotet et al. | A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of critical infrastructures | |
Skopik et al. | Dealing with advanced persistent threats in smart grid ICT networks | |
Efstathopoulos et al. | Operational data based intrusion detection system for smart grid | |
Colbert et al. | Intrusion detection in industrial control systems | |
CN110266680A (en) | A Method of Industrial Communication Anomaly Detection Based on Dual Similarity Measures | |
Teixeira et al. | Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach | |
Alani et al. | A two-stage cyber attack detection and classification system for smart grids | |
Chen et al. | Network Intrusion Detection Method of Power Monitoring System Based on Data Mining | |
Alqurashi et al. | On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks | |
Lai et al. | Review of intrusion detection methods and tools for distributed energy resources | |
Aldossary et al. | Securing SCADA systems against cyber-attacks using artificial intelligence | |
Deng et al. | Intrusion detection method based on support vector machine access of modbus TCP protocol | |
Pan et al. | Anomaly behavior analysis for building automation systems | |
Mehmood et al. | Securing industrial control systems (ICS) through attack modelling and rule-based learning | |
Liang | Research on network security filtering model and key algorithms based on network abnormal traffic analysis | |
Anwar et al. | Improving anomaly detection in SCADA network communication with attribute extension | |
Li | Research and design of network intrusion detection system |