[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Huang et al., 2017 - Google Patents

Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks

Huang et al., 2017

View PDF
Document ID
9116437112149562872
Author
Huang K
Zhou C
Tian Y
Tu W
Peng Y
Publication year
Publication venue
2017 27th International Telecommunication Networks and Applications Conference (ITNAC)

External Links

Snippet

Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastructures and industrial facilities. Cyber-attacks to SCADA networks may cause equipment damage or even fatalities. Identifying risks in SCADA networks is critical to …
Continue reading at eprints.qut.edu.au (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Similar Documents

Publication Publication Date Title
Huang et al. Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks
Huang et al. Assessing the physical impact of cyberattacks on industrial cyber-physical systems
Kalech Cyber-attack detection in SCADA systems using temporal pattern recognition techniques
Zhang et al. A survey on attack detection, estimation and control of industrial cyber–physical systems
US11973777B2 (en) Knowledge graph for real time industrial control system security event monitoring and management
Tantawy et al. Model-based risk assessment for cyber physical systems security
Eckhart et al. Quantitative security risk assessment for industrial control systems: Research opportunities and challenges
Qin et al. Association analysis-based cybersecurity risk assessment for industrial control systems
Ntalampiras et al. A fault diagnosis system for interdependent critical infrastructures based on HMMs
Konstantinou et al. Chaos engineering for enhanced resilience of cyber-physical systems
Rajawat et al. Cyber-physical system for industrial automation using quantum deep learning
Masood et al. A Blockchain-based data-driven fault-tolerant control system for smart factories in industry 4.0
Monzer et al. Model-based IDS design for ICSs
Bhosale et al. Integrated Safety-Security Risk Assessment for Production Systems: A Use Case Using Bayesian Belief Networks
Mesadieu et al. Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA Infrastructure
Kim et al. Consider the consequences: a risk assessment approach for industrial control systems
Akbarian et al. Attack resilient cloud-based control systems for industry 4.0
Hollerer et al. Challenges in ot security and their impacts on safety-related cyber-physical production systems
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Ma et al. Digital-Twin-Based CPS Anomaly Diagnosis and Security Defense Countermeasure Recommendation
Masood et al. Control over blockchain for data-driven fault tolerant control in industry 4.0
Koucham et al. Cross-domain alert correlation methodology for industrial control systems
Koucham Intrusion detection for industrial control systems
Bi et al. Novel cyber fault prognosis and resilience control for cyber–physical systems
Manyfield-Donald et al. The Current State of Fingerprinting in Operational Technology Environments