Blog
About

198
views
0
recommends
+1 Recommend
1 collections
    8
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      On the Edge Realtime Intrusion Prevention System for DoS Attack

      1 , , Ph.D. 2 , , Ph.D. 1

      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)

      ICS & SCADA Cyber Security Research

      29 - 30 August 2018

      SCADA, ICS, on-the-edge Intrusion Prevention System, Denial-of-Service attack, Unsupervised Machine Learning

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Industrial control systems manage critical infrastructures that are immensely diverse and complicated. These highly linked critical infrastructures are made up of networks of industrial control system (ICS) each responsible for controlling critical processes. During its nascent stages the controllers in the ICS were built for robust operation in extreme industrial conditions, but little to no emphasis was placed on safeguarding the system against potential cyberthreats. The industrial networks having legacy controllers are air gapped from the enterprise network hence a centrally deployed NIDS in the same network of the trusted nodes is often used as the last line of defence against intrusions such as malicious activity or policy violation. Most cyber incidents in industrial control systems have witnessed the breach of the air gap and compromised trusted nodes. Hence this paper proposes an on-the-edge Intrusion Prevention System (IPS) that can detect and prevent Denial of Service (DoS) attack on the Programmable Logic Controllers (PLCs) from trusted nodes at real time. A novel attribute of our proposed framework is that it is generic in nature and can be used on any PLC irrespective of the critical infrastructure being controlled by it. A wide range of experimentation has been performed to validate the performance of our proposed IPS.

          Related collections

          Most cited references 18

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          A Taxonomy of Cyber Attacks on SCADA Systems

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            OpenPLC: An open source alternative to automation

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              W32. stuxnet dossier

                Bookmark

                Author and article information

                Contributors
                Conference
                August 2018
                August 2018
                : 84-91
                Affiliations
                [1 ]Department of Electrical and Computer Engineering, The University of Alabama in Huntsville, Huntsville, USA
                [2 ]Department of Computer Science, The University of Alabama in Huntsville, Huntsville, USA
                Article
                10.14236/ewic/ICS2018.10
                © Das et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                5th International Symposium for ICS & SCADA Cyber Security Research 2018
                ICS-CSR 2018
                5
                University of Hamburg, Germany
                29 - 30 August 2018
                Electronic Workshops in Computing (eWiC)
                ICS & SCADA Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article