2014
DOI: 10.14569/ijarai.2014.031006
|View full text |Cite
|
Sign up to set email alerts
|

A real time OCSVM Intrusion Detection module with low overhead for SCADA systems

Abstract: Abstract-In this paper we present a intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition) system. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM (One-Class Support Vector Machine) is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…The research applying machine learning techniques using publicly available SCADA datasets and some of the related techniques on public datasets are outlined in Table 1. One Class Support Vector Machine (OCSVM) for automated anomaly detection (Schuster, et al, 2015) from SCADA telecommunications data was used by (Jiang & Yasakethu, 2013;Maglaras, & Jiang, 2014). They proposed clustering the anomalies into different types to generate a corresponding alarm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The research applying machine learning techniques using publicly available SCADA datasets and some of the related techniques on public datasets are outlined in Table 1. One Class Support Vector Machine (OCSVM) for automated anomaly detection (Schuster, et al, 2015) from SCADA telecommunications data was used by (Jiang & Yasakethu, 2013;Maglaras, & Jiang, 2014). They proposed clustering the anomalies into different types to generate a corresponding alarm.…”
Section: Related Workmentioning
confidence: 99%
“…Gas Pipeline MLP with GWO (Mansouri, et al, 2017) Gas Pipeline K-means, Naïve Bayesian, PCA-SVD, GMM (Shirazi et al, 2016) Gas pipeline LSTM (Feng et al, 2017) Water Distribution System (DUWWTP) KNN, K-means (Almalawi, et al, 2014) DUWWTP, Gas pipeline SVDD, PCA (Nader et al, 2014) Network trace OCSVM, K-means (Maglaras, & Jiang, 2014) CERT Insider Threat RNN (Tuor et al, 2017) algorithms is provided (Mansouri, et. al., 2017) for anomaly detection in a gas distribution network (Beaver, et al, 2013) and dimensionality reduction techniques for improving accuracy were also used.…”
Section: Dataset Technique Referencementioning
confidence: 99%
See 1 more Smart Citation