메뉴 건너뛰기




Volumn , Issue , 2014, Pages 275-281

Data clustering-based anomaly detection in industrial control systems

Author keywords

anomaly detection; big data; clustering; cyber physical security; intrusion detection

Indexed keywords

BIG DATA; CLASSIFICATION (OF INFORMATION); CLUSTER ANALYSIS; CLUSTERING ALGORITHMS; COMPRESSIBILITY OF GASES; COMPUTER CRIME; CRIME; DATA MINING; GAS COMPRESSORS; INTRUSION DETECTION; LARGE DATASET; NETWORK SECURITY;

EID: 84913609480     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCP.2014.6937009     Document Type: Conference Paper
Times cited : (98)

References (20)
  • 2
    • 84894904843 scopus 로고    scopus 로고
    • Physical process resilience-aware network design for SCADA systems
    • B. Genge and C. Siaterlis, "Physical process resilience-aware network design for SCADA systems," Computers & Electrical Engineering, Elsevier, vol. 40, no. 1, pp. 142-157, 2014.
    • (2014) Computers & Electrical Engineering Elsevier , vol.40 , Issue.1 , pp. 142-157
    • Genge, B.1    Siaterlis, C.2
  • 4
    • 79953895474 scopus 로고    scopus 로고
    • Lessons from stuxnet
    • Apr
    • T. Chen and S. Abu-Nimeh, "Lessons from Stuxnet," Computer, vol. 44, no. 4, pp. 91-93, Apr. 2011.
    • (2011) Computer , vol.44 , Issue.4 , pp. 91-93
    • Chen, T.1    Abu-Nimeh, S.2
  • 6
    • 84913605593 scopus 로고    scopus 로고
    • Cybersecurity: Authoritative reports and resources, by topic
    • April
    • R. Tehan, "Cybersecurity: Authoritative Reports and Resources, by Topic," in Congressional Research Service, April 3, 2014.
    • (2014) Congressional Research Service , vol.3
    • Tehan, R.1
  • 8
    • 33947709385 scopus 로고    scopus 로고
    • Enhanced Internet security by a distributed traffic control service based on traffic ownership
    • August
    • M. Bossardt, T. Dübendorfer and B. Plattner, "Enhanced Internet security by a distributed traffic control service based on traffic ownership," Network and Computer Applications, vol. 30, no. 3, p. 841-857, August 2007.
    • (2007) Network and Computer Applications , vol.30 , Issue.3 , pp. 841-857
    • Bossardt, M.1    Dübendorfer, T.2    Plattner, B.3
  • 9
    • 84913608280 scopus 로고    scopus 로고
    • A Review of cyber attack classification technique based on data mining and neural network Approach
    • B. Dharamkar and R. R. Singh, "A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach," IJCTT, vol. 7, no. 2, pp. 100-105, 2014.
    • (2014) IJCTT , vol.7 , Issue.2 , pp. 100-105
    • Dharamkar, B.1    Singh, R.R.2
  • 11
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness
    • T. Bass, "Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness," Communications of the ACM, vol. 43, no. 4, pp. 99-105, 2001.
    • (2001) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 12
    • 0142253852 scopus 로고    scopus 로고
    • ADAM: A testbed for exploring the use of data mining in intrusion detection
    • D. Barbara, J. Couto, S. Jajodia and N. Wu, "ADAM: A testbed for exploring the use of data mining in intrusion detection," SIGMOD, vol. 130, no. 4, pp. 15-28, 2001.
    • (2001) SIGMOD , vol.130 , Issue.4 , pp. 15-28
    • Barbara, D.1    Couto, J.2    Jajodia, S.3    Wu, N.4
  • 15
    • 84913609374 scopus 로고    scopus 로고
    • EPIC: A testbed for scientifically rigorous cyber-physical security experimentation
    • Dec
    • C. Siaterlis, B. Genge and M. Hohenadel, "EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation," Emerging Topics in Computing, IEEE Transactions on, vol. 1, pp. 319,330, Dec. 2013.
    • (2013) Emerging Topics in Computing IEEE Transactions on , vol.1 , pp. 319-330
    • Siaterlis, C.1    Genge, B.2    Hohenadel, M.3
  • 17
    • 84900397521 scopus 로고    scopus 로고
    • A Connection pattern-based approach to detect network traffic anomalies in critical infrastructures
    • Amsterdam, The Netherlands
    • B. Genge, D. Rusu and P. Haller, "A Connection Pattern-based Approach to Detect Network Traffic Anomalies in Critical Infrastructures," 2014 ACM European Workshop on System Security (EuroSec2014), Amsterdam, The Netherlands, pp. 1-6, 2014.
    • (2014) 2014 ACM European Workshop on System Security (EuroSec2014) , pp. 1-6
    • Genge, B.1    Rusu, D.2    Haller, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.