Corpus ID: 14631522

Anomaly-Based Intrusion Detection for SCADA Systems

  title={Anomaly-Based Intrusion Detection for SCADA Systems},
  author={D. Yang and A. Usynin and J. Hines},
  • D. Yang, A. Usynin, J. Hines
  • Published 2006
  • Computer Science
  • Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA). These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be… CONTINUE READING
    122 Citations
    Neural Network based Intrusion Detection System for critical infrastructures
    • 196
    • PDF
    Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy
    • Highly Influenced
    • PDF
    SCADA Networks Anomaly-based Intrusion Detection System
    • 2
    Online intrusion detection design and implementation for SCADA networks
    Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis
    • 15
    An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol
    • 2
    • 1
    • PDF
    A hybrid model for anomaly-based intrusion detection in SCADA networks
    • 18


    Network intrusion detection
    • 1,106
    An Intrusion-Detection Model
    • D. Denning
    • Computer Science
    • IEEE Transactions on Software Engineering
    • 1987
    • 2,364
    • PDF
    Computer System Intrusion Detection: A Survey
    • 179
    • PDF
    Proactive Fault Monitoring in Enterprise Servers
    • 38
    • PDF
    Industrial Network Security, ISA-The Instrumentation, Systems, and Automation
    • Society (December
    • 2004
    Continuous System Telemetry Harness
    • Gross.pdf,
    • 2005
    Technical Review of On - line Monitoring Techniques for Performance Assessment : Part II Theoretical Issues " , NUREG / CR - 6895
    • 2005
    Technical Review of On-line Monitoring Techniques for Performance Assessment: Part II Theoretical Issues
    • NUREG/CR-6895. Submitted for Review to the U.S. Nuclear Regulatory Commission (NRC)
    • 2005
    Technical Review of On-line Monitoring Techniques for Performance Assessment: Part II Theoretical Issues", NUREG/CR-6895. Submitted for Review to the U.S
    • Nuclear Regulatory Commission (NRC)
    • 2005