Learn More
In a model-based intrusion detection approach for protecting SCADA networks, we construct models that characterize the expected/acceptable behavior of the system, and detect attacks that cause violations of these models. Process control networks tend to have static topologies, regular traffic patterns, and a limited number of applications and protocols(More)
Process Control Systems (PCSs) and Process Control Networks (PCNs) are instrumental in the safe, reliable, and efficient operation of many physical processes in our critical infrastructures. However, PCNs increasingly employ commodity information technology (IT) elements and are being connected to the Internet. As a result, they have inherited IT cyberspace(More)
  • 1