A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 10
Abstract
Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT) will bring new opportunities to business and society, along with new threats and security risks. One major change that ICS will face will be that of the dynamic network topology. Changes in the network architecture will affect the performance of the ICS along with the efficiency of the security mechanisms that are deployed. The current article investigates how changes in the network architecture of a supervisory control and data acquisition (SCADA) system affect the performance of an Intrusion Detection System IDS that is based on the One class Support Vector Machine (OCSVM). Also the article proposes an adaptive mechanism that can cope with such changes and can work in real time situations. The performance of the proposed adaptive IDS is tested using traces from a Hybrid ICS testbed with a dynamic topology.
Authors and Affiliations
Barnaby Stewart, Luis Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simoes, Helge Janicke
TiPeNeSS: A Timed Petri Net Simulator Software with Generally Distributed Firing Delays
Performance analysis can be carried out in several ways, especially in case of Markovian models. In order to interpret high level of abstraction, we often use modeling tools like timed Petri nets (TPNs). Although some su...
Security Issues in ProtoGENI
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage,...
Implementing Energy Saving Techniques for Sensor Nodes in IoT Applications
The technique is designed to optimize the energy consumption for sensor processing layer in Internet Of Things (IoT). Sleep time calculation algorithm is built on the gateway to predict the sleep time of sensor nodes acc...
Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection
This paper evaluates outage probability (OP) of a cooperative underlay cognitive radio network in the presence of a passive secondary eavesdropper under joint impacts of limited interference from a primary network and ha...
A Trusted Mobile Payment Scheme Based on Body Area Networks
With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted...