Huang et al., 2017 - Google Patents
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networksHuang et al., 2017
View PDF- Document ID
- 9116437112149562872
- Author
- Huang K
- Zhou C
- Tian Y
- Tu W
- Peng Y
- Publication year
- Publication venue
- 2017 27th International Telecommunication Networks and Applications Conference (ITNAC)
External Links
Snippet
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastructures and industrial facilities. Cyber-attacks to SCADA networks may cause equipment damage or even fatalities. Identifying risks in SCADA networks is critical to …
- 238000004088 simulation 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B23/00—Testing or monitoring of control systems or parts thereof
- G05B23/02—Electric testing or monitoring
- G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
- G05B23/0218—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks | |
Huang et al. | Assessing the physical impact of cyberattacks on industrial cyber-physical systems | |
Kalech | Cyber-attack detection in SCADA systems using temporal pattern recognition techniques | |
Zhang et al. | A survey on attack detection, estimation and control of industrial cyber–physical systems | |
US11973777B2 (en) | Knowledge graph for real time industrial control system security event monitoring and management | |
Tantawy et al. | Model-based risk assessment for cyber physical systems security | |
Eckhart et al. | Quantitative security risk assessment for industrial control systems: Research opportunities and challenges | |
Qin et al. | Association analysis-based cybersecurity risk assessment for industrial control systems | |
Ntalampiras et al. | A fault diagnosis system for interdependent critical infrastructures based on HMMs | |
Konstantinou et al. | Chaos engineering for enhanced resilience of cyber-physical systems | |
Rajawat et al. | Cyber-physical system for industrial automation using quantum deep learning | |
Masood et al. | A Blockchain-based data-driven fault-tolerant control system for smart factories in industry 4.0 | |
Monzer et al. | Model-based IDS design for ICSs | |
Bhosale et al. | Integrated Safety-Security Risk Assessment for Production Systems: A Use Case Using Bayesian Belief Networks | |
Mesadieu et al. | Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA Infrastructure | |
Kim et al. | Consider the consequences: a risk assessment approach for industrial control systems | |
Akbarian et al. | Attack resilient cloud-based control systems for industry 4.0 | |
Hollerer et al. | Challenges in ot security and their impacts on safety-related cyber-physical production systems | |
Liu et al. | SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering | |
Ma et al. | Digital-Twin-Based CPS Anomaly Diagnosis and Security Defense Countermeasure Recommendation | |
Masood et al. | Control over blockchain for data-driven fault tolerant control in industry 4.0 | |
Koucham et al. | Cross-domain alert correlation methodology for industrial control systems | |
Koucham | Intrusion detection for industrial control systems | |
Bi et al. | Novel cyber fault prognosis and resilience control for cyber–physical systems | |
Manyfield-Donald et al. | The Current State of Fingerprinting in Operational Technology Environments |