Blog
About

338
views
1
recommends
+1 Recommend
1 collections
    11
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Industrial Control System Defence: Debugging ICS Maintenance Network Traffic

        , , , ,

      6th International Symposium for ICS & SCADA Cyber Security Research 2019 (ICS-CSR)

      Cyber Security Research

      10th-12th September 2019

      Network Security, Industrial Control System, Machine Learning, Maintenance, Cyber Defence

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Industrial Control System (ICS) third-party maintenance introduces security risk into an organisation, as access is granted for performance of named maintenance tasks on industrial equipment, but there is currently no fine-grained way to monitor the activity. This paper applies Machine Learning to ICS network traffic, in order to alert operational staff to unauthorised activity.

          The work describes a method for identifying deviations, by characterising network traffic purpose, and applying software to dissect, learn and monitor maintenance traffic, then presenting results in a chart.

          Related collections

          Most cited references 4

          • Record: found
          • Abstract: not found
          • Book: not found

          Digital Heritage Progress in Cultural Heritage Documentation Preservation and Protection

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Mining network data for intrusion detection through combining SVMs with ant colony networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Abnormal Detection Method of Industrial Control System Based on Behavior Model

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2019
                September 2019
                : 11-20
                Affiliations
                Cyber Security Architecture, Innovation and Scouting

                Airbus, Quadrant House, Celtic Springs Business Park, Duffryn, Newport NP10 8FZ

                www.airbus.com/cyber-innovation
                Article
                10.14236/ewic/icscsr19.2
                © Angela Smith et al. Published by BCS Learning and Development Ltd. 6th International Symposium for ICS & SCADA Cyber Security Research 2019

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                6th International Symposium for ICS & SCADA Cyber Security Research 2019
                ICS-CSR
                6
                Athens, Greece
                10th-12th September 2019
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article