2016
DOI: 10.1109/tdsc.2015.2443793
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Control System Network Intrusion Detection by Telemetry Analysis

Abstract: Until recently, Industrial Control Systems (ICSs) used "air-gap" security measures, where every node of the ICS network was isolated from other networks, including the Internet, by a physical disconnect. Attaching ICS networks to the Internet benefits companies and engineers who use them. However, as these systems were designed for use in the air-gapped security environment, protocols used by ICSs contain little to no security features and are vulnerable to various attacks. This paper proposes an approach to d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
63
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(63 citation statements)
references
References 24 publications
0
63
0
Order By: Relevance
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
“…Regis Barbosa and Pras present a novel flow-based intrusion and anomaly detection method [39]. Air gapped Industrial Control Systems (ICSs) and attacks on such Figure 1: Relation of Sub-Processes systems are evaluated by Ponomarev and Atkison [38]. Ghaeini and Tippenhauer present a hierarchical model for industrial intrusion detection to combine information from the physical, as well as the Programmable Logic Controller (PLC) layer [20].…”
Section: Related Workmentioning
confidence: 99%
“…Kwon et al [26] present a behavior-based IDS for IEC 61850 protocol using both statistical analysis of traditional network features and specification-based metrics to secure smart grid network. Ponomarev and Atkison [27] give a network telemetry-based intrusion detection system to secure the communication of network attached ICSs, and network telemetry include temporal data of packet arrival, packet sizes, session times and sizes, amount of dropped packets and more. Although the statisticalbased approaches may identify some unknown attacks in some degree, the main drawbacks are that it is a difficult task to set the different metrics or parameters of traffic profile, and the deep industrial communication behaviors cannot be simply modeled by a statistical distribution.…”
Section: Related Workmentioning
confidence: 99%
“…Constraints on these measurements can be overcome by remote measurement method (telemetry) using UAV (Unmanned Aerial Vehicle) [3,4]. The telemetry process is the measurement of the parameters of an object (objects, space, natural conditions) whose measurement results will be sent elsewhere either via cable or wireless [5,6]. The telemetry communications UAV is carried out wirelessly.…”
Section: Introductionmentioning
confidence: 99%