2015
DOI: 10.1252/jcej.14we323
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Control System Monitoring Based on Communication Profile

Abstract: Industrial control systems (ICS) have hidden vulnerabilities that cannot be usually solved by IT security tools, because of their 24 h 365 d non-stop, non-update and non-patch operation. There is, however, very limited report of cyber-attacks, so that owners of critical infrastructures do not have much attention for their ICS protection. This is a kind of misunderstanding of the current situation caused by a lacking of capability to detect a cyber-intrusion. In order to apply an Intrusion Detection System (IDS… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Since the communication behaviors in ICSs are usually periodic [28], [34], the length of the period can be taken as the E-DFA matching length. But there are some special situations need to be considered in reality, such as: 1) Packet retransmission: a same packet is sent repeatedly at two adjacent instant, i.e.…”
Section: End If 16: End Formentioning
confidence: 99%
“…Since the communication behaviors in ICSs are usually periodic [28], [34], the length of the period can be taken as the E-DFA matching length. But there are some special situations need to be considered in reality, such as: 1) Packet retransmission: a same packet is sent repeatedly at two adjacent instant, i.e.…”
Section: End If 16: End Formentioning
confidence: 99%
“…The previous work [13] suggested that packet intervals reflect the characteristics of packets in a typical ICS network. In a typical ICS network, there are IP communications between the object linking and embedding (OLE) for process control (OPC) server and the single loop controller (SLC) (programmable logic controller (PLC)).…”
Section: Packet Intervalsmentioning
confidence: 99%
“…The proposed method was evaluated using datasets obtained from the testbed prepared for previous research [13]. Fig.…”
Section: Evaluation Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…When an ICS network during steady-state exhibits a particular pattern, the techniques can infer the hidden structure of the pattern and detect anomalous behavior by comparing the pattern during steady-state. Matta et al [15] demonstrated that packet intervals during steadystate have a particular pattern and cyber-attacks may disturb this pattern. Furthermore, a certain type of periodicity was observed in time-series packet intervals using a testbed, and an IDS was proposed using singular spectrum analysis (SSA) by searching for the disturbance [16].…”
Section: Introductionmentioning
confidence: 99%