메뉴 건너뛰기




Volumn 11, Issue 5, 2016, Pages 893-906

An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems

Author keywords

[No Author keywords available]

Indexed keywords

CLUSTER ANALYSIS; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; DATA ACQUISITION; ELECTRIC POWER SYSTEM CONTROL; INTRUSION DETECTION; MERCURY (METAL); WATER DISTRIBUTION SYSTEMS; WATER SUPPLY SYSTEMS;

EID: 84963934385     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2512522     Document Type: Article
Times cited : (89)

References (38)
  • 1
    • 36249010910 scopus 로고    scopus 로고
    • Lessons learned from the Maroochy water breach
    • Boston, MA, USA: Springer
    • J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," in Critical Infrastructure Protection, vol. 253. Boston, MA, USA: Springer, 2007, pp. 73-82.
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 5
    • 84860491228 scopus 로고    scopus 로고
    • Critical statebased filtering system for securing SCADA network protocols
    • Oct.
    • I. N. Fovino, A. Coletta, A. Carcano, M. Masera, "Critical statebased filtering system for securing SCADA network protocols," IEEE Trans. Ind. Electron., vol. 59, no. 10, pp. 3943-3950, Oct. 2012.
    • (2012) IEEE Trans. Ind. Electron. , vol.59 , Issue.10 , pp. 3943-3950
    • Fovino, I.N.1    Coletta, A.2    Carcano, A.3    Masera, M.4
  • 6
    • 80054803633 scopus 로고    scopus 로고
    • Wind turbine condition monitoring and reliability analysis by SCADA information
    • Jul.
    • W. Yang and J. Jiang, "Wind turbine condition monitoring and reliability analysis by SCADA information," in Proc. 2nd Int. Conf. Mech. Autom. Control Eng. (MACE), Jul. 2011, pp. 1872-1875.
    • (2011) Proc. 2nd Int. Conf. Mech. Autom. Control Eng. (MACE) , pp. 1872-1875
    • Yang, W.1    Jiang, J.2
  • 9
    • 84883829594 scopus 로고    scopus 로고
    • Application of data driven methods for condition monitoring maintenance
    • I. Marton, A. I. Sánchez, S. Carlos, S. Martorell, "Application of data driven methods for condition monitoring maintenance," Chem. Eng. Trans., vol. 33, pp. 301-306, 2013.
    • (2013) Chem. Eng. Trans. , vol.33 , pp. 301-306
    • Marton, I.1    Sánchez, A.I.2    Carlos, S.3    Martorell, S.4
  • 10
    • 79952527986 scopus 로고    scopus 로고
    • On SCADA control system command and response injection and intrusion detection
    • W. Gao, T. Morris, B. Reaves, D. Richey, "On SCADA control system command and response injection and intrusion detection," in Proc. eCrime Res. Summit (eCrime), 2010, pp. 1-9.
    • (2010) Proc. ECrime Res. Summit (ECrime) , pp. 1-9
    • Gao, W.1    Morris, T.2    Reaves, B.3    Richey, D.4
  • 11
    • 70349311540 scopus 로고    scopus 로고
    • Online wind turbine fault detection through automated SCADA data analysis
    • A. Zaher, S. D. J. McArthur, D. G. Infield, Y. Patel, "Online wind turbine fault detection through automated SCADA data analysis," Wind Energy, vol. 12, no. 6, pp. 574-593, 2009.
    • (2009) Wind Energy , vol.12 , Issue.6 , pp. 574-593
    • Zaher, A.1    McArthur, S.D.J.2    Infield, D.G.3    Patel, Y.4
  • 12
    • 84928173034 scopus 로고    scopus 로고
    • Integrated ocsvm mechanism for intrusion detection in SCADA systems
    • L. Maglaras, J. Jiang, T. J. Cruz, "Integrated ocsvm mechanism for intrusion detection in SCADA systems," Electron. Lett., vol. 50, no. 25, pp. 1935-1936, 2014.
    • (2014) Electron. Lett. , vol.50 , Issue.25 , pp. 1935-1936
    • Maglaras, L.1    Jiang, J.2    Cruz, T.J.3
  • 13
    • 84963973422 scopus 로고    scopus 로고
    • A real time OCSVM intrusion detection module with low overhead for SCADA systems
    • L. A. Maglaras and J. Jiang, "A real time OCSVM intrusion detection module with low overhead for SCADA systems," Int. J. Adv. Res. Artif. Intell., vol. 3, no. 10, pp. 45-51, 2014.
    • (2014) Int. J. Adv. Res. Artif. Intell. , vol.3 , Issue.10 , pp. 45-51
    • Maglaras, L.A.1    Jiang, J.2
  • 14
    • 70449371464 scopus 로고    scopus 로고
    • Neural network based intrusion detection system for critical infrastructures
    • Jun.
    • O. Linda, T. Vollmer, M. Manic, "Neural network based intrusion detection system for critical infrastructures," in Proc. Int. Joint Conf. Neural Netw. (IJCNN), Jun. 2009, pp. 1827-1834.
    • (2009) Proc. Int. Joint Conf. Neural Netw. (IJCNN) , pp. 1827-1834
    • Linda, O.1    Vollmer, T.2    Manic, M.3
  • 16
    • 70449653118 scopus 로고    scopus 로고
    • Communication pattern anomaly detection in process control systems
    • May
    • A. Valdes and S. Cheung, "Communication pattern anomaly detection in process control systems," in Proc. IEEE Conf. Technol. Homeland Secur. (HST), May 2009, pp. 22-29.
    • (2009) Proc IEEE Conf. Technol. Homeland Secur. (HST) , pp. 22-29
    • Valdes, A.1    Cheung, S.2
  • 17
    • 84888316290 scopus 로고    scopus 로고
    • WASAM: A dynamic wide-area situational awareness model for critical domains in smart grids
    • Jan.
    • C. Alcaraz and J. Lopez, "WASAM: A dynamic wide-area situational awareness model for critical domains in smart grids," Future Generat. Comput. Syst., vol. 30, pp. 146-154, Jan. 2014.
    • (2014) Future Generat. Comput. Syst. , vol.30 , pp. 146-154
    • Alcaraz, C.1    Lopez, J.2
  • 18
    • 84892439359 scopus 로고    scopus 로고
    • Diagnosis mechanism for accurate monitoring in critical infrastructure protection
    • C. Alcaraz and J. Lopez, "Diagnosis mechanism for accurate monitoring in critical infrastructure protection," Comput. Standards Interfaces, vol. 36, no. 3, pp. 501-512, 2014.
    • (2014) Comput. Standards Interfaces , vol.36 , Issue.3 , pp. 501-512
    • Alcaraz, C.1    Lopez, J.2
  • 20
    • 84906094761 scopus 로고    scopus 로고
    • An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    • Oct.
    • A. Almalawi, X. Yu, Z. Tari, A. Fahad, I. Khalil, "An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems," Comput. Secur., vol. 46, pp. 94-110, Oct. 2014.
    • (2014) Comput. Secur. , vol.46 , pp. 94-110
    • Almalawi, A.1    Yu, X.2    Tari, Z.3    Fahad, A.4    Khalil, I.5
  • 22
    • 78649934709 scopus 로고    scopus 로고
    • School Inf. Comput. Sci., Univ. California, Irvine, Irvine, CA, USA. [Online] Available
    • A. Frank and A. Asuncion. (2010). UCI machine learning repository. School Inf. Comput. Sci., Univ. California, Irvine, Irvine, CA, USA. [Online]. Available: http://archive.ics.uci.edu/ml
    • (2010) UCI Machine Learning Repository
    • Frank, A.1    Asuncion, A.2
  • 24
    • 84963968841 scopus 로고    scopus 로고
    • ModBus/TCP Simulator. [Online]. Available accessed Nov. 2011
    • ModBus/TCP Simulator. [Online]. Available: http://www.modbustools. com, accessed Nov. 2011.
  • 27
    • 84963968826 scopus 로고    scopus 로고
    • Daily Residential Water Use for Melbourne. [Online]. Available accessed Nov. 2011
    • Daily Residential Water Use for Melbourne. [Online]. Available: http://www.melbournewater.com.au, accessed Nov. 2011.
  • 29
    • 0003136237 scopus 로고
    • Efficient and effective clustering methods for spatial data mining
    • R. T. Ng and J. Han, "Efficient and effective clustering methods for spatial data mining," in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 144-155.
    • (1994) Proc. 20th Int. Conf. Very Large Data Bases , pp. 144-155
    • Ng, R.T.1    Han, J.2
  • 30
    • 0030157145 scopus 로고    scopus 로고
    • BIRCH: An efficient data clustering method for very large databases
    • Jun.
    • T. Zhang, R. Ramakrishnan, M. Livny, "BIRCH: An efficient data clustering method for very large databases," ACM SIGMOD Rec., vol. 25, pp. 103-114, Jun. 1996.
    • (1996) ACM SIGMOD Rec. , vol.25 , pp. 103-114
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3
  • 32
    • 84994158589 scopus 로고    scopus 로고
    • STING: A statistical information grid approach to spatial data mining
    • Feb.
    • W. Wang, J. Yang, R. R. Muntz, "STING: A statistical information grid approach to spatial data mining," in Proc. 23rd Int. Conf. Very Large Data Bases, Feb. 1997, pp. 186-195.
    • (1997) Proc. 23rd Int. Conf. Very Large Data Bases , pp. 186-195
    • Wang, W.1    Yang, J.2    Muntz, R.R.3
  • 33
    • 85170282443 scopus 로고    scopus 로고
    • A density based algorithm for discovering clusters in large spatial databases with noise
    • M. Ester, H.-P. Kriegel, J. Sander, X. Xu, "A density based algorithm for discovering clusters in large spatial databases with noise," in Proc. KDD, vol. 7. 1996, pp. 226-231.
    • (1996) Proc. KDD , vol.7 , pp. 226-231
    • Ester, M.1    Kriegel, H.-P.2    Sander, J.3    Xu, X.4
  • 37
    • 18644368589 scopus 로고    scopus 로고
    • Outlier detection based on the distribution of distances between data points
    • Aug.
    • V. Šaltenis, "Outlier detection based on the distribution of distances between data points," Informatica, vol. 15, no. 3, pp. 399-410, Aug. 2004.
    • (2004) Informatica , vol.15 , Issue.3 , pp. 399-410
    • Šaltenis, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.