2016
DOI: 10.14236/ewic/ics2016.4
|View full text |Cite
|
Sign up to set email alerts
|

A Practical flow white list approach for SCADA systems

Abstract: The blatant vulnerability of industrial control systems, including those controlling critical infrastructure, is now well known. There is a need for immediately applicable security solutions that do not interfere with normal operations. Intrusion detection through flow white listing is an approach that can detect multiple components of modern attacks such as pivoting and command and control channels. However, the white list approach is not compatible with current black listbased IDS technology. This paper pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…This list can be preconfigured based on the knowledge of legitimate nodes and communication in the network, and/or configured dynamically based on the result of monitoring traffic by switches in the network. The papers [38]- [41] elaborate the network flow-aware anomaly detection approach.…”
Section: G Attack Analysismentioning
confidence: 99%
“…This list can be preconfigured based on the knowledge of legitimate nodes and communication in the network, and/or configured dynamically based on the result of monitoring traffic by switches in the network. The papers [38]- [41] elaborate the network flow-aware anomaly detection approach.…”
Section: G Attack Analysismentioning
confidence: 99%
“…SCADA networks have very predictable patterns compared to the IT network. [18] In the IT network, it is not possible to completely predict a list of allowable communication paths. A large portion of the traffic occurring in the IT network is involved in human actions, leading to dynamic traffic patterns.…”
Section: Intrusion Detection System(ids) For Scada Systemsmentioning
confidence: 99%
“…When evaluated on real SCADA datasets, legitimate flows absent from the learning generate most of the false alarms, but little is said on how to resolve this problem. Lemay et al (2016) show that ICS whitelists can be transformed into rulesets for Snort.…”
Section: Sdn For Intrusion Detection and Ics Securitymentioning
confidence: 99%
“…For these reasons, network-based intrusion detection has attracted the interest of researchers and different approaches have been described in the literature. One of them is the usage of whitelisting (Cheung et al 2007;Barbosa et al 2013;Lemay et al 2016). Whitelists describe permitted operations and exploit the fact that almost everything is automated in ICS such that traffic characteristics and topologies are stable (R. R. R. Barbosa and R. Sadre and A. Pras 2012).…”
Section: Introductionmentioning
confidence: 99%