Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and administrators rely on a variety of data sources to develop security situation awareness at runtime. In spite of the advances in Security Information and Event Management products and services for handling heterogeneous data sources, analysis of proprietary logs generated by industrial systems keeps posing many challenges due to the lack of standard practices, formats and threat models. This paper addresses log analysis to detect anomalies, such as failures and misuse, in a critical industrial system. We conduct our study with a real-life system by a top leading industry provider in the Air Traffic Control domain. The system emits massive volum...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical industrial systems have become profitable targets for cyber-attackers. Practitioners and ad...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
Critical computer systems strongly rely on event logs to record the occurrence of normative and anom...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
Industrial control systems (ICS) are moving from dedicated communications to switched and routed cor...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...