[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chromik et al., 2018 - Google Patents

Bro in SCADA: Dynamic intrusion detection policies based on a system model

Chromik et al., 2018

View PDF
Document ID
15784469501123526041
Author
Chromik J
Remke A
Haverkort B
Publication year
Publication venue
5th International Symposium for ICS & SCADA Cyber Security Research 2018

External Links

Snippet

We present an online monitoring tool for SCADA systems based on the network monitor Bro, which can be used locally at field stations. The tool generates alerts when suspicious and erroneous commands and sensor readings are detected. It can hence been seen as a local …
Continue reading at www.scienceopen.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks

Similar Documents

Publication Publication Date Title
Yang et al. Multidimensional intrusion detection system for IEC 61850-based SCADA networks
Yang et al. Multiattribute SCADA-specific intrusion detection system for power networks
Davis et al. A cyber-physical modeling and assessment framework for power grid infrastructures
EP2701340B1 (en) Method of monitoring operation of an electric power system and monitoring system
Liu et al. Intruders in the grid
EP2721801B1 (en) Security measures for the smart grid
Chromik et al. Bro in SCADA: Dynamic intrusion detection policies based on a system model
Suleiman et al. Integrated smart grid systems security threat model
EP3133793A1 (en) Method for mitigation of cyber attacks on industrial control systems
Parvania et al. Hybrid control network intrusion detection systems for automated power distribution systems
Hussain et al. Vulnerabilities and countermeasures in electrical substations
Parthasarathy et al. Bloom filter based intrusion detection for smart grid SCADA
Chromik et al. An integrated testbed for locally monitoring SCADA systems in smart grids
Yamashita et al. Measuring systemic risk of switching attacks based on cybersecurity technologies in substations
Nicholson et al. Position paper: Safety and security monitoring in ics/scada systems
Flosbach et al. Architecture and prototype implementation for process-aware intrusion detection in electrical grids
Kabir-Querrec et al. Power utility automation cybersecurity: IEC 61850 specification of an intrusion detection function
Anwar et al. Automatic security assessment of critical cyber-infrastructures
Hong et al. Security monitoring and network management for the power control network
Tefek et al. A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies
Ciancamerla et al. An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed
Claveria et al. Communication and Information Security Assessment of a Digital Substation
Colelli et al. Exploiting system model for securing cps: the anomaly based ids perspective
Yang et al. Cybersecurity testing technology in smart substations
Lai et al. An active security defense strategy for wind farm based on automated decision