A Case Study of Anomaly Detection in Industrial Environments

被引:1
作者
Zou, Jianfeng [1 ]
Jin, Xueqi [2 ]
Zhang, Lei [1 ]
Wang, Yueqiang [1 ]
Li, Bo [3 ]
机构
[1] State Grid Jiaxing Elect Power Supply Co, Beijing, Peoples R China
[2] State Grid Zhejiang Elect Power Co, Beijing, Peoples R China
[3] Beihang Univ, Beijing, Peoples R China
来源
2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019) | 2019年
关键词
Case Study; Anomaly Detection; Industrial Environment;
D O I
10.1109/CSE/EUC.2019.00063
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Industrial Control Security (ICS) plays an important role in protecting Industrial assets and processed from being tampered by attackers. Recent years witness the fast development of ICS technology. However there are still few real case study to verify the effectiveness of ICS approaches when dealing with ICS threats. In this paper, we provide a real case study in industrial environments. The case study demonstrates the attacking process of virus spread and worm propagation in industrial environments. The case study also shows how the anomaly detection techniques could be used to identify the bad behaviors of virus and help security administrators to enhance the security of industrial environments.
引用
收藏
页码:294 / 298
页数:5
相关论文
共 10 条
[1]  
[Anonymous], 2012, IEEE COMMUNICATIONS
[2]  
[Anonymous], CLUSTERING APPROACH
[3]  
Chunmei Gao, 2014, NETWORK TRAFFIC ANOM
[4]  
Hua Zhao, 2013, RES ANOMALY DETECTIO
[5]   Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis [J].
Kleinmann, Amit ;
Wool, Avishai .
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, :1-12
[6]  
Luo Yaofeng, 2013, RES DESIGN INTRUSION
[7]   Detecting Integrity Attacks on SCADA Systems [J].
Mo, Yilin ;
Chabukswar, Rohan ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2014, 22 (04) :1396-1407
[8]  
NIST Manufacturing Engineering, 2008, NIST PROGR MAN ENG L
[9]   Objective Attributes Weights Determining Based on Shannon Information Entropy in Hesitant Fuzzy Multiple Attribute Decision Making [J].
Zhang, Yingjun ;
Wang, Yizhi ;
Wang, Jingping .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
[10]   Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation [J].
Zhou, Chunjie ;
Huang, Shuang ;
Xiong, Naixue ;
Yang, Shuang-Hua ;
Li, Huiyun ;
Qin, Yuanqing ;
Li, Xuan .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2015, 45 (10) :1345-1360