2012
DOI: 10.1007/s10207-012-0163-8
|View full text |Cite
|
Sign up to set email alerts
|

A log mining approach for process monitoring in SCADA

Abstract: SCADA (supervisory control and data acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(34 citation statements)
references
References 24 publications
0
33
1
Order By: Relevance
“…For the data modelling of continuous series, we build the autoregressive model and derive process control limits. We leverage an open source implementation of the autoregressive model 1 . To derive control limits, we implement Shewart control limits following the description in [116].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…For the data modelling of continuous series, we build the autoregressive model and derive process control limits. We leverage an open source implementation of the autoregressive model 1 . To derive control limits, we implement Shewart control limits following the description in [116].…”
Section: Methodsmentioning
confidence: 99%
“…Finally, we discus promising approaches for detecting the identified threats. This work has appeared as a journal article [1] and a refereed workshop paper [6].…”
Section: Thesis Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…At times, a continuous range of IP addresses have their address 71. We observe telnet commands being issued to perform the address change, but not to all hosts.…”
Section: Othermentioning
confidence: 99%
“…As an intrusion detection system, flow whitelisting presents several advantages over deep packet inspection [37] and host level [71] IDS. The most obvious advantages are simplicity and efficiency [21].…”
Section: Flow Whitelistingmentioning
confidence: 99%