ICS Cyber Attack Analysis and a New Diagnosis Approach

作者: Ercan Nurcan Yılmaz , Hasan Hüseyin Sayan , Furkan Üstünsoy , Serkan Gönen , Erhan Sindiren

DOI: 10.1007/978-3-030-36178-5_11

关键词:

摘要: Artificial Intelligence and Machine Learning technologies have a widespread use in many disciplines thanks to raw data processing computational power. The capabilities of these will enable the identification legal illegal traffic/behavior by classifying rapidly without damaging continuity system through high amount network traffic/behavior, which is one biggest problems field cyber security. In this respect, artificial intelligence machine learning provide valuable contributions protecting Industrial Control Systems (ICS), play an important role control critical infrastructures such as electrical power generation-transmission-distribution systems, nuclear plants, gas water, against cyber-attack. study, it aimed reveal anatomy attacks executing denial service, Start/Stop, man middle PLCs, component ICS. test environment created on real two types PLCs were analyzed. analyzes focused obtain rule sequences, can be used technologies, benefitting from sets obtained environment. way, new security approach has been for results also revealed importance PLCs’ vulnerability continuous monitoring order detect identify soon possible protect ICS maintain its functioning.

参考文章(19)
Paul Oman, Matthew Phillips, Intrusion Detection and Event Monitoring in SCADA Networks international conference on critical infrastructure protection. pp. 161- 173 ,(2007) , 10.1007/978-0-387-75462-8_12
Shancang Li, Theo Tryfonas, Honglei Li, The Internet of Things: a security point of view Internet Research. ,vol. 26, pp. 337- 359 ,(2016) , 10.1108/INTR-07-2014-0173
Durga Samanth Pidikiti, Rajesh Kalluri, R. K. Senthil Kumar, B. S. Bindhumadhava, SCADA communication protocols: vulnerabilities, attacks and possible mitigations CSI Transactions on ICT. ,vol. 1, pp. 135- 141 ,(2013) , 10.1007/S40012-013-0013-5
Peeyush Jain, Paritosh Tripathi, None, SCADA security: a review and enhancement for DNP3 based systems CSI Transactions on ICT. ,vol. 1, pp. 301- 308 ,(2013) , 10.1007/S40012-013-0024-2
Béla Genge, Christos Siaterlis, Igor Nai Fovino, Marcelo Masera, A cyber-physical experimentation environment for the security analysis of networked industrial control systems Computers & Electrical Engineering. ,vol. 38, pp. 1146- 1161 ,(2012) , 10.1016/J.COMPELECENG.2012.06.015
Y. Yang, T. Littler, H.F. Wang, K. McLaughlin, S. Sezer, Rule-Based Intrusion Detection System for SCADA Networks Renewable Power Generation Conference (RPG 2013), 2nd IET. pp. 1- 4 ,(2013) , 10.1049/CP.2013.1729
Bonnie Zhu, Anthony Joseph, Shankar Sastry, A Taxonomy of Cyber Attacks on SCADA Systems the internet of things. pp. 380- 388 ,(2011) , 10.1109/ITHINGS/CPSCOM.2011.34
Igor Nai Fovino, Andrea Carcano, Marcelo Masera, Alberto Trombetta, An experimental investigation of malware attacks on SCADA systems International Journal of Critical Infrastructure Protection. ,vol. 2, pp. 139- 145 ,(2009) , 10.1016/J.IJCIP.2009.10.001
Jonathan Kirsch, Stuart Goose, Yair Amir, Dong Wei, Paul Skare, Survivable SCADA Via Intrusion-Tolerant Replication IEEE Transactions on Smart Grid. ,vol. 5, pp. 60- 70 ,(2014) , 10.1109/TSG.2013.2269541
Annarita Giani, Gabor Karsai, Tanya Roosta, Aakash Shah, Bruno Sinopoli, Jon Wiley, A testbed for secure and robust SCADA systems real time technology and applications symposium. ,vol. 5, pp. 4- ,(2008) , 10.1145/1399583.1399587