A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2017, Vol 4, Issue 10
Abstract
Industrial Control Systems (ICS) are getting more vulnerable as they become increasingly interconnected with other systems. Industrial Internet of Things(IIoT) will bring new opportunities to business and society, along with new threats and security risks. One major change that ICS will face will be that of the dynamic network topology. Changes in the network architecture will affect the performance of the ICS along with the efficiency of the security mechanisms that are deployed. The current article investigates how changes in the network architecture of a supervisory control and data acquisition (SCADA) system affect the performance of an Intrusion Detection System IDS that is based on the One class Support Vector Machine (OCSVM). Also the article proposes an adaptive mechanism that can cope with such changes and can work in real time situations. The performance of the proposed adaptive IDS is tested using traces from a Hybrid ICS testbed with a dynamic topology.
Authors and Affiliations
Barnaby Stewart, Luis Rosa, Leandros A. Maglaras, Tiago J. Cruz, Mohamed Amine Ferrag, Paulo Simoes, Helge Janicke
Eigenvalue-based Detection Techniques Using Finite Dimensional Complex Random Matrix Theory: A Review
Detection of primary users without requiring information of signal is of great importance in spectrum sensing (SS) in Cognitive Radio. Therefore, in recent years, eigenvalue based spectrum sensing algorithms are under th...
Multi-Radio 5G Architecture for Connected and Autonomous Vehicles: Application and Design Insights
Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and ef...
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed
IPv6 has yet to become more than a worthy successor of IPv4, which remains, for now, the dominant Internet Protocol. This is due to the complicated transition period through which the Internet will have to go, until IPv6...
An Introduction of Real-time Embedded Optimisation Programming for UAV Systems under Disaster Communication
For disaster communications, it is very challenging for the contemporary wireless technology and infrastructure to meet the demands for connectivity. Modern wireless networks should be developed to satisfy the increasing...
Energy Efficient Dual Issue Embedded Processor
While energy efficiency is essential to extend the battery life of embedded devices, performance cannot be ignored. High performance superscalar embedded processors are more energy efficient than low performance scalar p...