Proceedings of the 13th International Joint Conference on E-Business and Telecommunications 2016
DOI: 10.5220/0005969803270335
|View full text |Cite
|
Sign up to set email alerts
|

OSCIDS: An Ontology based SCADA Intrusion Detection Framework

Abstract: Abstract:This paper presents the design, development, and validation of an ontology based SCADA intrusion detection system. The proposed system analyses SCADA network communications and can derive additional information based on the background knowledge and ontology models to enhance the intrusion detection data. The developed intrusion model captures network communications, cyber attacks and the context within the SCADA domain. Moreover, a set of semantic rules were constructed to detect various attacks and e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Timeliness analysis is available in 11 studies, as indicated in Table 7. Among the results concerning packet as a unit of analysis, deep packet inspection applied in [51] outperforms other techniques [41], [43], [46] at least for an order of magnitude. In the cases where dataset instance is observed as a unit of analysis, deep learning method presented in [63] performs much worse than clustering and outlier detection [60] and hybrid method presented in [61].…”
Section: ) Timelinessmentioning
confidence: 98%
See 2 more Smart Citations
“…Timeliness analysis is available in 11 studies, as indicated in Table 7. Among the results concerning packet as a unit of analysis, deep packet inspection applied in [51] outperforms other techniques [41], [43], [46] at least for an order of magnitude. In the cases where dataset instance is observed as a unit of analysis, deep learning method presented in [63] performs much worse than clustering and outlier detection [60] and hybrid method presented in [61].…”
Section: ) Timelinessmentioning
confidence: 98%
“…Expert systems were considered in [41], [55] and [58]. The system proposed in [41] uses ontology for extraction of semantic relations between attacks and detection of intrusions. Ontology is used to define the logical relationships between packet and attack instances, cyber attacks and the Modbus TCP communications.…”
Section: Knowledge-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation