Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning
dc.contributor.author | HINDY, Hanan | |
hal.structure.identifier | Institut de Recherche de l'Ecole Navale [IRENAV] | |
dc.contributor.author | BROSSET, David | |
dc.contributor.author | BAYNE, Ethan | |
hal.structure.identifier | University of Mauritius | |
hal.structure.identifier | Middlesex University | |
dc.contributor.author | SEEAM, Amar | |
dc.contributor.author | BELLEKENS, Xavier | |
dc.date.accessioned | 2021-05-14T09:42:28Z | |
dc.date.available | 2021-05-14T09:42:28Z | |
dc.date.issued | 2019-01-31 | |
dc.identifier.isbn | 978-3-030-12785-5 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/76738 | |
dc.description.abstract | Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset. | |
dc.language.iso | en | |
dc.publisher | Springer International Publishing | |
dc.source.title | Computer SecurityESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers | |
dc.title | Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning | |
dc.type | Chapitre d'ouvrage | |
dc.identifier.doi | 10.1007/978-3-030-12786-2_1 | |
dc.subject.hal | Informatique [cs] | |
bordeaux.page | 3-19 | |
bordeaux.hal.laboratories | Institut de Mécanique et d’Ingénierie de Bordeaux (I2M) - UMR 5295 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.institution | INRAE | |
bordeaux.institution | Arts et Métiers | |
hal.identifier | hal-02139453 | |
hal.version | 1 | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-02139453v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.title=Improving%20SIEM%20for%20Critical%20SCADA%20Water%20Infrastructures%20Using%20Machine%20Learning&rft.btitle=Computer%20SecurityESORICS%202018%20International%20Workshops,%20CyberICPS%202018%20and%20SECPRE%202018,%20Barcelona,%20Spain,%20September%206%E2%80%937,%202018,%20Revis&rft.atitle=Improving%20SIEM%20for%20Critical%20SCADA%20Water%20Infrastructures%20Using%20Machine%20Learning&rft.date=2019-01-31&rft.spage=3-19&rft.epage=3-19&rft.au=HINDY,%20Hanan&BROSSET,%20David&BAYNE,%20Ethan&SEEAM,%20Amar&BELLEKENS,%20Xavier&rft.isbn=978-3-030-12785-5&rft.genre=unknown |
Fichier(s) constituant ce document
Fichiers | Taille | Format | Vue |
---|---|---|---|
Il n'y a pas de fichiers associés à ce document. |