DOI: 10.1007/978-0-387-88523-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Modeling And Detecting Anomalies In Scada Systems

Abstract: The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…The predictable nature of SCADA traffic can be leveraged to detect system anomalies [5,21,24]. However, a knowledgeable attacker can seize the advantage by manipulating computational states or utilizing signal noise to obfuscate attacks that would otherwise be recognized [4,20,21].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The predictable nature of SCADA traffic can be leveraged to detect system anomalies [5,21,24]. However, a knowledgeable attacker can seize the advantage by manipulating computational states or utilizing signal noise to obfuscate attacks that would otherwise be recognized [4,20,21].…”
Section: Related Workmentioning
confidence: 99%
“…We argue that this adversary capability highlights a requirement for additional sensors [2,6,20] to provide different points of view in order to detect anomalies [21]. This requirement is underscored by the introduction of sophisticated control processes that rely on multivariate controls and, hence, require more complex forms of supervision [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we mainly focus on the anomaly detection topic in the cyber-physical security of SCADA. Actually, several effective anomaly detection methods have already been proposed in the anomaly detection area such as system modeling [15][16][17][18][19][20] and data-based analysis [20][21][22][23][24][25], which should always accept a compromise in the modeling uncertainty and data complexity. Besides model-based and coupled data-based intrusion detection, some intrinsic properties of SCADA are considered in detection.…”
Section: Introductionmentioning
confidence: 99%
“…A second approach is to model the normal data flows and control operations within the S.C.A.D.A system to detect anomalies caused by attempts to change or damage the system. This has the advantage that it can detect unknown attacks and the action of malicious insiders, but unless it is handled carefully it can generate a lot of false alarms [13].…”
Section: Introductionmentioning
confidence: 99%