[go: up one dir, main page]

Kaouk et al., 2019 - Google Patents

A review of intrusion detection systems for industrial control systems

Kaouk et al., 2019

Document ID
6724588324287575024
Author
Kaouk M
Flaus J
Potet M
Groz R
Publication year
Publication venue
2019 6th International Conference on Control, Decision and Information Technologies (CoDIT)

External Links

Snippet

Industrial Control Systems are found often in industrial sectors and critical infrastructures to monitor and control industrial processes. Recently, the security of industrial control systems has gained much attention as these systems now exhibit an increased interaction with the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Kaouk et al. A review of intrusion detection systems for industrial control systems
Feng et al. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
Khan et al. HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems
Hu et al. A survey of intrusion detection on industrial control systems
Suaboot et al. A taxonomy of supervised learning for idss in scada environments
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Ayodeji et al. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
CN115996146B (en) Numerical control system security situation sensing and analyzing system, method, equipment and terminal
Clotet et al. A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of critical infrastructures
Skopik et al. Dealing with advanced persistent threats in smart grid ICT networks
Efstathopoulos et al. Operational data based intrusion detection system for smart grid
Colbert et al. Intrusion detection in industrial control systems
CN110266680A (en) A Method of Industrial Communication Anomaly Detection Based on Dual Similarity Measures
Teixeira et al. Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
Alani et al. A two-stage cyber attack detection and classification system for smart grids
Chen et al. Network Intrusion Detection Method of Power Monitoring System Based on Data Mining
Alqurashi et al. On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
Lai et al. Review of intrusion detection methods and tools for distributed energy resources
Aldossary et al. Securing SCADA systems against cyber-attacks using artificial intelligence
Deng et al. Intrusion detection method based on support vector machine access of modbus TCP protocol
Pan et al. Anomaly behavior analysis for building automation systems
Mehmood et al. Securing industrial control systems (ICS) through attack modelling and rule-based learning
Liang Research on network security filtering model and key algorithms based on network abnormal traffic analysis
Anwar et al. Improving anomaly detection in SCADA network communication with attribute extension
Li Research and design of network intrusion detection system