Nothing Special   »   [go: up one dir, main page]

Beaudet et al., 2020 - Google Patents

Process-aware model-based intrusion detection system on filtering approach: Further investigations

Beaudet et al., 2020

View PDF
Document ID
13675256614997761172
Author
Beaudet A
Sicard F
Escudero C
Zamaï E
Publication year
Publication venue
2020 IEEE International Conference on Industrial Technology (ICIT)

External Links

Snippet

Against new emerging cyber-threats targeting Industrial Control Systems (ICSs), Intrusion Detection Systems (IDSs) have emerged as viable solutions for implementing signature or behavioural approaches. The Security Approach based on Filter Execution (SAFE), a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0243Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Luo et al. Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities
US11206278B2 (en) Risk-informed autonomous adaptive cyber controllers
Yang et al. Anomaly-based intrusion detection for SCADA systems
Kordestani et al. Observer-based attack detection and mitigation for cyberphysical systems: A review
US11689544B2 (en) Intrusion detection via semantic fuzzing and message provenance
Kriaa et al. Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
US9369484B1 (en) Dynamic security hardening of security critical functions
CN105939334A (en) Anomaly detection in industrial communications networks
Escudero et al. Process-aware model based IDSs for industrial control systems cybersecurity: approaches, limits and further research
Yu et al. Trustworthiness modeling and analysis of cyber-physical manufacturing systems
Shakya Process mining error detection for securing the IoT system
Iturbe et al. On the feasibility of distinguishing between process disturbances and intrusions in process control systems using multivariate statistical process control
Rubio et al. Tracking advanced persistent threats in critical infrastructures through opinion dynamics
Eid et al. IIoT network intrusion detection using machine learning
Alqurashi et al. On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
Beaudet et al. Process-aware model-based intrusion detection system on filtering approach: Further investigations
Akbarian et al. Attack resilient cloud-based control systems for industry 4.0
Franck et al. From ICS attacks' analysis to the SAFE approach: implementation of filters based on behavioral models and critical state distance for ICS cybersecurity
Mahmoud et al. Cloud control systems: analysis, design and estimation
Koucham et al. Efficient mining of temporal safety properties for intrusion detection in industrial control systems
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Xiao et al. A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment
Alem et al. A hybrid intrusion detection system in industry 4.0 based on ISA95 standard
Tian et al. A security model of SCADA system based on attack tree
Veeramany et al. A framework for development of risk-informed autonomous adaptive cyber controllers