Beaudet et al., 2020 - Google Patents
Process-aware model-based intrusion detection system on filtering approach: Further investigationsBeaudet et al., 2020
View PDF- Document ID
- 13675256614997761172
- Author
- Beaudet A
- Sicard F
- Escudero C
- Zamaï E
- Publication year
- Publication venue
- 2020 IEEE International Conference on Industrial Technology (ICIT)
External Links
Snippet
Against new emerging cyber-threats targeting Industrial Control Systems (ICSs), Intrusion Detection Systems (IDSs) have emerged as viable solutions for implementing signature or behavioural approaches. The Security Approach based on Filter Execution (SAFE), a …
- 238000001514 detection method 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
- G05B23/0243—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities | |
US11206278B2 (en) | Risk-informed autonomous adaptive cyber controllers | |
Yang et al. | Anomaly-based intrusion detection for SCADA systems | |
Kordestani et al. | Observer-based attack detection and mitigation for cyberphysical systems: A review | |
US11689544B2 (en) | Intrusion detection via semantic fuzzing and message provenance | |
Kriaa et al. | Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments | |
US9369484B1 (en) | Dynamic security hardening of security critical functions | |
CN105939334A (en) | Anomaly detection in industrial communications networks | |
Escudero et al. | Process-aware model based IDSs for industrial control systems cybersecurity: approaches, limits and further research | |
Yu et al. | Trustworthiness modeling and analysis of cyber-physical manufacturing systems | |
Shakya | Process mining error detection for securing the IoT system | |
Iturbe et al. | On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control | |
Rubio et al. | Tracking advanced persistent threats in critical infrastructures through opinion dynamics | |
Eid et al. | IIoT network intrusion detection using machine learning | |
Alqurashi et al. | On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks | |
Beaudet et al. | Process-aware model-based intrusion detection system on filtering approach: Further investigations | |
Akbarian et al. | Attack resilient cloud-based control systems for industry 4.0 | |
Franck et al. | From ICS attacks' analysis to the SAFE approach: implementation of filters based on behavioral models and critical state distance for ICS cybersecurity | |
Mahmoud et al. | Cloud control systems: analysis, design and estimation | |
Koucham et al. | Efficient mining of temporal safety properties for intrusion detection in industrial control systems | |
Liu et al. | SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering | |
Xiao et al. | A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment | |
Alem et al. | A hybrid intrusion detection system in industry 4.0 based on ISA95 standard | |
Tian et al. | A security model of SCADA system based on attack tree | |
Veeramany et al. | A framework for development of risk-informed autonomous adaptive cyber controllers |