Sequence-aware Intrusion Detection in Industrial Control Systems

作者: Marco Caselli , Emmanuele Zambon , Frank Kargl

DOI: 10.1145/2732198.2732200

关键词:

摘要: … detection within industrial control systems still deals with the following limitations: Security solutions such as intrusion detection systems … physical processes under control Focusing on a …

参考文章(22)
Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols Research in Attacks, Intrusions, and Defenses. pp. 354- 373 ,(2012) , 10.1007/978-3-642-33338-5_18
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera, Modbus/DNP3 State-Based Intrusion Detection System advanced information networking and applications. pp. 729- 736 ,(2010) , 10.1109/AINA.2010.86
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 265- 274 ,(2002) , 10.1145/586110.586146
Hervé Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems Computer Networks. ,vol. 31, pp. 805- 822 ,(1999) , 10.1016/S1389-1286(98)00017-6
V. Chandola, A. Banerjee, V. Kumar, Anomaly Detection for Discrete Sequences: A Survey IEEE Transactions on Knowledge and Data Engineering. ,vol. 24, pp. 823- 839 ,(2012) , 10.1109/TKDE.2010.235
Niv Goldenberg, Avishai Wool, Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems International Journal of Critical Infrastructure Protection. ,vol. 6, pp. 63- 75 ,(2013) , 10.1016/J.IJCIP.2013.05.001
Dina Hadžiosmanović, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel, Through the eye of the PLC: semantic security monitoring for industrial processes annual computer security applications conference. pp. 126- 135 ,(2014) , 10.1145/2664243.2664277