2019
DOI: 10.1007/978-3-030-31328-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Multi-stage Cyber-Attacks Detection in the Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Correlation can be based on the similarity of events by parameters (for example, source and destination IP addresses and ports), and the scenario can be represented as a graph (Haas and Fischer, 2019;Bajtoš et al, 2020). So SOAAPR (Heigl et al, 2021) (Streaming Outlier Analysis and Attack Pattern Recognition) matches and groups alerts in streaming mode, and the resulting clusters are converted into a graphical representation.…”
Section: Hybrid Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Correlation can be based on the similarity of events by parameters (for example, source and destination IP addresses and ports), and the scenario can be represented as a graph (Haas and Fischer, 2019;Bajtoš et al, 2020). So SOAAPR (Heigl et al, 2021) (Streaming Outlier Analysis and Attack Pattern Recognition) matches and groups alerts in streaming mode, and the resulting clusters are converted into a graphical representation.…”
Section: Hybrid Modelsmentioning
confidence: 99%
“…Event grouping and pattern searching are characteristic of rule-based and graphical models, while intrusion and anomaly detection and prediction are characteristic of graphical and machine learning models. Recent trends in security event correlation are leading to an increasing use of hybrid AI-models (Haas and Fischer, 2019;Bajtoš et al, 2020;Deng and Hooi, 2021). Such models allow researchers to use the advantages of various correlation methods and offset the disadvantages.…”
Section: Summary Of Ai-based Security Event Correlation Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Dedicated intrusion detection systems (e.g., for smart meters 14 ) and extensions to common IDS tools (e.g., Snort and Bro [15][16][17] ) have been proposed. Valdes 18 introduces an architecture that monitors ICS traffic for irregular patterns.…”
Section: A Glimpse Into Ics Protocol Securitymentioning
confidence: 99%