Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H.
A Log Mining Approach for Process Monitoring in SCADA.
International Journal of Information Security, 11 (4).
*** ISI Impact 1,279 ***
This is the latest version of this eprint.
Full text available as:
Official URL: http://dx.doi.org/10.1007/s10207-012-0163-8
SCADA (Supervisory Control and Data Acquisition)
systems are used for controlling and monitoring industrial
processes. We propose a methodology to systematically identify
potential process-related threats in SCADA. Process-related
threats take place when an attacker gains user access rights
and performs actions, which look legitimate, but which are
intended to disrupt the SCADA process. To detect such threats,
we propose a semi-automated approach of log processing. We
conduct experiments on a real-life water treatment facility. A
preliminary case study suggests that our approach is effective in
detecting anomalous events that might alter the regular process
|Research Group:||EWI-DIES: Distributed and Embedded Security|
|Research Program:||CTIT-ISTRICE: Integrated Security and Privacy in a Networked World|
|Research Project:||MIDAS: Intrusion detection for SCADA|
|Uncontrolled Keywords:||SCADA, security, intrusion detection, log analysis, pattern mining|
|Deposited On:||04 April 2012|
|ISI Impact Factor:||1,279|
Available Versions of this Item
Export this item as:
To correct this item please ask your editor
Repository Staff Only: edit this item