메뉴 건너뛰기




Volumn 11, Issue 4, 2012, Pages 231-251

A log mining approach for process monitoring in SCADA

Author keywords

Frequent pattern mining; HAZOP; ICS; Log analysis; MELISSA; PHEA; Process related threat; SCADA; SCADA log; Security

Indexed keywords

FREQUENT PATTERN MINING; HAZOP; ICS; LOG ANALYSIS; MELISSA; PHEA; PROCESS RELATED THREAT; SCADA; SCADA LOG; SECURITY;

EID: 84864415794     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-012-0163-8     Document Type: Article
Times cited : (57)

References (37)
  • 1
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • In: Bocca, J. B., Jarke, M., Zaniolo, C. (eds.), Morgan Kaufmann
    • Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Bocca, J. B., Jarke, M., Zaniolo, C. (eds.) In: Proceedings of the 20th International Conference on VLDB, pp. 487-499. Morgan Kaufmann (1994).
    • (1994) Proceedings of the 20th International Conference on VLDB , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 33947501709 scopus 로고    scopus 로고
    • Novelty detection and management to safeguard information-intensive critical infrastructures
    • Balducelli C., Lavalle L., Vicoli G.: Novelty detection and management to safeguard information-intensive critical infrastructures. Int. J. Emerg. Manag. 4(1), 88-103 (2007).
    • (2007) Int. J. Emerg. Manag. , vol.4 , Issue.1 , pp. 88-103
    • Balducelli, C.1    Lavalle, L.2    Vicoli, G.3
  • 3
    • 15544363043 scopus 로고    scopus 로고
    • Principle components and importance ranking of distributed anomalies
    • Begnum K., Burgess M.: Principle components and importance ranking of distributed anomalies. Mach. Learn. 58, 217-230 (2005).
    • (2005) Mach. Learn. , vol.58 , pp. 217-230
    • Begnum, K.1    Burgess, M.2
  • 4
    • 48249129248 scopus 로고    scopus 로고
    • Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
    • John Hill, L. T. C. (ed.), IEEE Press
    • Bellettini, C., Rrushi, J.: Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness. In: John Hill, L. T. C. (ed.) Proceedings of 8th IEEE SMC Information Assurance Workshop, pp. 341-348. IEEE Press (2007).
    • (2007) Proceedings of 8th IEEE SMC Information Assurance Workshop , pp. 341-348
    • Bellettini, C.1    Rrushi, J.2
  • 6
    • 84864401107 scopus 로고    scopus 로고
    • Profiling high frequency accident locations using association rules
    • Washington DC (USA), Transportation Research Board
    • Brijs, T., Geurts, K., Wets, G., Vanhoof, K.: Profiling high frequency accident locations using association rules. In: Proceedings of 82nd Annual Transportation Research Board, Washington DC (USA), pp. 123-130. Transportation Research Board (2003).
    • (2003) Proceedings of 82nd Annual Transportation Research Board , pp. 123-130
    • Brijs, T.1    Geurts, K.2    Wets, G.3    Vanhoof, K.4
  • 11
    • 27644510774 scopus 로고    scopus 로고
    • Fast algorithms for frequent itemset mining using FP-Trees
    • Grahne G., Zhu J.: Fast algorithms for frequent itemset mining using FP-Trees. IEEE Trans. Knowl. Data Eng. 17, 1347-1362 (2005).
    • (2005) IEEE Trans. Knowl. Data Eng. , vol.17 , pp. 1347-1362
    • Grahne, G.1    Zhu, J.2
  • 13
    • 0036997440 scopus 로고    scopus 로고
    • Discovering actionable patterns in event data
    • Hellerstein J. L., Ma S., Perng C.-S.: Discovering actionable patterns in event data. IBM Syst. J. 41, 475-493 (2002).
    • (2002) IBM Syst. J. , vol.41 , pp. 475-493
    • Hellerstein, J.L.1    Ma, S.2    Perng, C.-S.3
  • 16
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • Berkeley, CA, USA, USENIX Association
    • Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In: Proceedings of 7th Conference on USENIX Security Symposium-vol. 7, pp. 6-6. Berkeley, CA, USA, USENIX Association (1998).
    • (1998) Proceedings of 7th Conference on USENIX Security Symposium , vol.7 , pp. 6
    • Lee, W.1    Stolfo, S.2
  • 22
    • 0023313036 scopus 로고
    • A methodology for knowledge acquisition and reasoning in failure analysis of systems
    • Narayanan N. H., Viswanadham N.: A methodology for knowledge acquisition and reasoning in failure analysis of systems. IEEE Trans. Syst. Man Cybern. 17(2), 274-288 (1987).
    • (1987) IEEE Trans. Syst. Man Cybern. , vol.17 , Issue.2 , pp. 274-288
    • Narayanan, N.H.1    Viswanadham, N.2
  • 24
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • Paxson V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435-2463 (1999).
    • (1999) Comput. Netw. , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 26
    • 75149197559 scopus 로고    scopus 로고
    • Technical report, U. S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Washington, DC
    • Rantala, R.: Cybercrime against businesses. Technical report, U. S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Washington, DC (2004).
    • (2004) Cybercrime against businesses
    • Rantala, R.1
  • 27
    • 75249091463 scopus 로고    scopus 로고
    • Cybercrimes against critical infrastructures: a study of online criminal organization and techniques
    • Rege-Patwardhan A.: Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Crim. Justice Stud. 22(3), 261-271 (2009).
    • (2009) Crim. Justice Stud. , vol.22 , Issue.3 , pp. 261-271
    • Rege-Patwardhan, A.1
  • 28
    • 51849126454 scopus 로고    scopus 로고
    • Real-time log file analysis using the simple event correlator (sec)
    • USENIX Association, Berkeley, CA, USA
    • Rouillard, J.: Real-time log file analysis using the simple event correlator (sec). In: Proceedings of 18th USENIX conference on System administration, pp. 133-150. USENIX Association, Berkeley, CA, USA (2004).
    • (2004) Proceedings of 18th USENIX conference on System administration , pp. 133-150
    • Rouillard, J.1
  • 31
    • 70349806627 scopus 로고    scopus 로고
    • Cybersecurity for SCADA Systems
    • Tulsa
    • Shaw, W. T.: Cybersecurity for SCADA Systems. PennWell Corp. Tulsa (2006).
    • (2006) PennWell Corp
    • Shaw, W.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.