Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies &Amp; Factory Automation (ETFA 2012) 2012
DOI: 10.1109/etfa.2012.6489703
|View full text |Cite
|
Sign up to set email alerts
|

A distributed intrusion detection system for industrial automation networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 11 publications
0
6
0
1
Order By: Relevance
“…[14] Machine learning based Presented an intrusion detection system based on SCADA intrusion detectors (SCIDs) placed on control and field level of the automation. Each SCID analyzes the specific network traffic of its observation domain and determine anomalies.…”
Section: Methodsmentioning
confidence: 99%
“…[14] Machine learning based Presented an intrusion detection system based on SCADA intrusion detectors (SCIDs) placed on control and field level of the automation. Each SCID analyzes the specific network traffic of its observation domain and determine anomalies.…”
Section: Methodsmentioning
confidence: 99%
“…In [1] we proposed a network-based intrusion detection system consisting of multiple autonomous components, called SCADA Intrusion Detectors (SCIDs), as illustrated in Figure 1.…”
Section: Motivationmentioning
confidence: 99%
“…The main contributions of this paper are: (1) we identify the requirements for intrusion detection in ICS; (2) we present an approach for self-learning intrusion detection whose characteristics meet these requirements; (3) on the basis of this approach, we discuss the challenges and future aspects of research for realizing such a tailored self-learning intrusion detection for ICS.…”
Section: Fig 1 Multiple Scids Monitoring An Example Icsmentioning
confidence: 99%
“…Much of the research on security of industrial automation systems has focused on countermeasures for mitigating security risks; examples of countermeasures are intrusion detection [1,2] certificate management [3] and public key infrastructures [4]. The need for specific countermeasures is based on security risk assessment that comprehensively considers threats to confidentiality, integrity and availability in the application, as is done for example in [5].…”
Section: Introductionmentioning
confidence: 99%