Chromik et al., 2018 - Google Patents
Bro in SCADA: Dynamic intrusion detection policies based on a system modelChromik et al., 2018
View PDF- Document ID
- 15784469501123526041
- Author
- Chromik J
- Remke A
- Haverkort B
- Publication year
- Publication venue
- 5th International Symposium for ICS & SCADA Cyber Security Research 2018
External Links
Snippet
We present an online monitoring tool for SCADA systems based on the network monitor Bro, which can be used locally at field stations. The tool generates alerts when suspicious and erroneous commands and sensor readings are detected. It can hence been seen as a local …
- 238000001514 detection method 0 title abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Multidimensional intrusion detection system for IEC 61850-based SCADA networks | |
Yang et al. | Multiattribute SCADA-specific intrusion detection system for power networks | |
Davis et al. | A cyber-physical modeling and assessment framework for power grid infrastructures | |
EP2701340B1 (en) | Method of monitoring operation of an electric power system and monitoring system | |
Liu et al. | Intruders in the grid | |
EP2721801B1 (en) | Security measures for the smart grid | |
Chromik et al. | Bro in SCADA: Dynamic intrusion detection policies based on a system model | |
Suleiman et al. | Integrated smart grid systems security threat model | |
EP3133793A1 (en) | Method for mitigation of cyber attacks on industrial control systems | |
Parvania et al. | Hybrid control network intrusion detection systems for automated power distribution systems | |
Hussain et al. | Vulnerabilities and countermeasures in electrical substations | |
Parthasarathy et al. | Bloom filter based intrusion detection for smart grid SCADA | |
Chromik et al. | An integrated testbed for locally monitoring SCADA systems in smart grids | |
Yamashita et al. | Measuring systemic risk of switching attacks based on cybersecurity technologies in substations | |
Nicholson et al. | Position paper: Safety and security monitoring in ics/scada systems | |
Flosbach et al. | Architecture and prototype implementation for process-aware intrusion detection in electrical grids | |
Kabir-Querrec et al. | Power utility automation cybersecurity: IEC 61850 specification of an intrusion detection function | |
Anwar et al. | Automatic security assessment of critical cyber-infrastructures | |
Hong et al. | Security monitoring and network management for the power control network | |
Tefek et al. | A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies | |
Ciancamerla et al. | An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed | |
Claveria et al. | Communication and Information Security Assessment of a Digital Substation | |
Colelli et al. | Exploiting system model for securing cps: the anomaly based ids perspective | |
Yang et al. | Cybersecurity testing technology in smart substations | |
Lai et al. | An active security defense strategy for wind farm based on automated decision |