Abstract—Digital control systems are increasingly being deployed in critical infrastructure such as electric power generation and distribution. To protect these process control systems, we present a learning-based approach for detecting anomalous network traffic patterns. These anomalous patterns may correspond to attack activities such as malware propagation or denial of service. Misuse detection, the mainstream intrusion detection approach used today, typically uses attack signatures to detect known, specific attacks, but may not be effective against new or variations of known attacks. Our approach, which does not rely on attack-specific knowledge, may provide a complementary detection capability for protecting digital control systems. I
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
Industrial control systems have stringent safety and security demands. High safety assurance can be ...
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interco...
Detecting network intrusions and anomalies in industrial control systems is growing in urgency. Such...
Detecting network intrusions and anomalies in industrial control systems is growing in urgency. Such...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
Part 3: Security ManagementInternational audienceRecent trends in automation technology lead to a ri...
Industrial control systems conduct processes which are core to our lives, from the generation, trans...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
Industrial control systems have stringent safety and security demands. High safety assurance can be ...
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interco...
Detecting network intrusions and anomalies in industrial control systems is growing in urgency. Such...
Detecting network intrusions and anomalies in industrial control systems is growing in urgency. Such...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
The deterministic and restricted nature of industrial control system networks sets them apart from m...
Part 3: Security ManagementInternational audienceRecent trends in automation technology lead to a ri...
Industrial control systems conduct processes which are core to our lives, from the generation, trans...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Detection of previously unknown attacks and malicious messages is a challenging problem faced by mod...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Current intrusion detection solutions are based on signature or rule-based detection. The large numb...
Industrial control systems have stringent safety and security demands. High safety assurance can be ...
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interco...