Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)

  • Meir KalechEmail author
  • Amit Shlomo
  • Robert Moskovich
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11527)


Supervisory Control and Data Acquisition (SCADA) is a system which is used to monitor and control various industrial and infrastructure systems, such as power plants, water disposal and distribution, and other systems which are crucial for our modern way of life.


Cyber-security SCADA Temporal pattern recognition 


  1. 1.
    Allen, J.F.: Maintaining knowledge about temporal intervals. In: Readings in Qualitative Reasoning about Physical Systems, pp. 361–372. Elsevier (1990)Google Scholar
  2. 2.
    Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63–75 (2013)CrossRefGoogle Scholar
  3. 3.
    Kam, P., Fu, A.W.: Discovering temporal patterns for interval-based events. In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 317–326. Springer, Heidelberg (2000). Scholar
  4. 4.
    Kushner, D.: The real story of stuxnet. IEEE Spectrum 3(50), 48–53 (2013)CrossRefGoogle Scholar
  5. 5.
    Moskovitch, R., Shahar, Y.: Fast time intervals mining using the transitivity of temporal relations. Knowl. Inf. Syst. 42(1), 21–48 (2015)CrossRefGoogle Scholar
  6. 6.
    Zhu, B., Sastry, S., Joseph, A.: A taxonomy of cyber attacks on SCADA systems. In: 2011 IEEE International Conference on Internet of Things, pp. 380–388 (2011)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Ben-Gurion University of the NegevBeershebaIsrael

Personalised recommendations