2015
DOI: 10.1007/978-3-662-45402-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Most research on the use of features generated from network traffic to detect anomalies focuses on specific protocols such as MODBUS/TCP or Profinet. The papers [12,16,34] utilise network traffic to establish a pattern of conventional MODBUS/TCP communications. [12] implement a deterministic finite automaton (DFA) for each communication between a human-machine interface and different programmable logic controllers (PLCs).…”
Section: Related Workmentioning
confidence: 99%
“…Most research on the use of features generated from network traffic to detect anomalies focuses on specific protocols such as MODBUS/TCP or Profinet. The papers [12,16,34] utilise network traffic to establish a pattern of conventional MODBUS/TCP communications. [12] implement a deterministic finite automaton (DFA) for each communication between a human-machine interface and different programmable logic controllers (PLCs).…”
Section: Related Workmentioning
confidence: 99%
“…The normal profile can be constructed using many categories of data sources. The work in [8,[16][17][18] used network traffic within ICS as a data source to model the normal communication. The Hidden Markov model (HMM) [16] was used to model packets delivered between devices for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The Hidden Markov model (HMM) [16] was used to model packets delivered between devices for intrusion detection. In addition, [17] proposed a method that learns the Modbus/TCP traffic transactions using the request message only. The authors of [18] employed a dynamic Bayesian network structure to characterize normal command and data sequences at a network level and achieved a low false positive rate.…”
Section: Related Workmentioning
confidence: 99%
“…Journal of Manufacturing Systems 47 (2018) [93][94][95][96][97][98][99][100][101][102][103][104][105][106] example, the data held in data historians' and engineers' workstations could be altered, or the network data packets could be changed causing, significant damage to the operation of the plant.…”
Section: N Tuptuk S Hailesmentioning
confidence: 99%