2018
DOI: 10.3390/app8122460
|View full text |Cite
|
Sign up to set email alerts
|

Towards Industrial Intrusion Prevention Systems: A Concept and Implementation for Reactive Protection

Abstract: Featured Application: The paper presents a concept to actively and automatically respond to security intrusions in Industrial Automation Systems. It is comprised of reactive actions, and security and operational policies that consider both security and architectural trends of this kind of systems. This concept is of significance to system stakeholders that wish to increase the security of their system by implementing automatic and active protection.Abstract: System intrusions violate the security of a system. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 50 publications
(51 reference statements)
0
1
0
Order By: Relevance
“…For the second validation IoRs were cross-checked against experimental ICS security detection use cases from three sources: The NIST IR8219 [20] identifies a total of 53 ICS behavioural anomaly detection use cases using four different tools; [28] lists 15 example events corresponding to violation of security policies in ICS; and the third is a report on a PoC performed in a manufacturing company in 2019. Table 3 lists the IoRs that match the observable events from these sources, indicating the tools used and the number of detection use cases or anomaly event types reviewed.…”
Section: • 7 Validation Of the Ior Librarymentioning
confidence: 99%
“…For the second validation IoRs were cross-checked against experimental ICS security detection use cases from three sources: The NIST IR8219 [20] identifies a total of 53 ICS behavioural anomaly detection use cases using four different tools; [28] lists 15 example events corresponding to violation of security policies in ICS; and the third is a report on a PoC performed in a manufacturing company in 2019. Table 3 lists the IoRs that match the observable events from these sources, indicating the tools used and the number of detection use cases or anomaly event types reviewed.…”
Section: • 7 Validation Of the Ior Librarymentioning
confidence: 99%