Afficher la notice abrégée

dc.contributor.authorHINDY, Hanan
hal.structure.identifierInstitut de Recherche de l'Ecole Navale [IRENAV]
dc.contributor.authorBROSSET, David
dc.contributor.authorBAYNE, Ethan
hal.structure.identifierUniversity of Mauritius
hal.structure.identifierMiddlesex University
dc.contributor.authorSEEAM, Amar
dc.contributor.authorBELLEKENS, Xavier
dc.date.accessioned2021-05-14T09:42:28Z
dc.date.available2021-05-14T09:42:28Z
dc.date.issued2019-01-31
dc.identifier.isbn978-3-030-12785-5
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/76738
dc.description.abstractNetwork Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset.
dc.language.isoen
dc.publisherSpringer International Publishing
dc.source.titleComputer SecurityESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
dc.titleImproving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
dc.typeChapitre d'ouvrage
dc.identifier.doi10.1007/978-3-030-12786-2_1
dc.subject.halInformatique [cs]
bordeaux.page3-19
bordeaux.hal.laboratoriesInstitut de Mécanique et d’Ingénierie de Bordeaux (I2M) - UMR 5295*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.institutionINRAE
bordeaux.institutionArts et Métiers
hal.identifierhal-02139453
hal.version1
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-02139453v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.title=Improving%20SIEM%20for%20Critical%20SCADA%20Water%20Infrastructures%20Using%20Machine%20Learning&rft.btitle=Computer%20SecurityESORICS%202018%20International%20Workshops,%20CyberICPS%202018%20and%20SECPRE%202018,%20Barcelona,%20Spain,%20September%206%E2%80%937,%202018,%20Revis&rft.atitle=Improving%20SIEM%20for%20Critical%20SCADA%20Water%20Infrastructures%20Using%20Machine%20Learning&rft.date=2019-01-31&rft.spage=3-19&rft.epage=3-19&rft.au=HINDY,%20Hanan&BROSSET,%20David&BAYNE,%20Ethan&SEEAM,%20Amar&BELLEKENS,%20Xavier&rft.isbn=978-3-030-12785-5&rft.genre=unknown


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée