Advertisement

Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)

  • Meir KalechEmail author
  • Amit Shlomo
  • Robert Moskovich
Conference paper
  • 543 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11527)

Abstract

Supervisory Control and Data Acquisition (SCADA) is a system which is used to monitor and control various industrial and infrastructure systems, such as power plants, water disposal and distribution, and other systems which are crucial for our modern way of life.

Keywords

Cyber-security SCADA Temporal pattern recognition 

References

  1. 1.
    Allen, J.F.: Maintaining knowledge about temporal intervals. In: Readings in Qualitative Reasoning about Physical Systems, pp. 361–372. Elsevier (1990)Google Scholar
  2. 2.
    Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63–75 (2013)CrossRefGoogle Scholar
  3. 3.
    Kam, P., Fu, A.W.: Discovering temporal patterns for interval-based events. In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 317–326. Springer, Heidelberg (2000).  https://doi.org/10.1007/3-540-44466-1_32CrossRefGoogle Scholar
  4. 4.
    Kushner, D.: The real story of stuxnet. IEEE Spectrum 3(50), 48–53 (2013)CrossRefGoogle Scholar
  5. 5.
    Moskovitch, R., Shahar, Y.: Fast time intervals mining using the transitivity of temporal relations. Knowl. Inf. Syst. 42(1), 21–48 (2015)CrossRefGoogle Scholar
  6. 6.
    Zhu, B., Sastry, S., Joseph, A.: A taxonomy of cyber attacks on SCADA systems. In: 2011 IEEE International Conference on Internet of Things, pp. 380–388 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Ben-Gurion University of the NegevBeershebaIsrael

Personalised recommendations