A Log Mining Approach for Process Monitoring in SCADA

Share/Save/Bookmark

Hadžiosmanović, Dina and Bolzoni, Damiano and Hartel, Pieter (2012) A Log Mining Approach for Process Monitoring in SCADA. International Journal of Information Security, 11 . ISSN 1615-5262

open access
[img]
Preview
PDF
11MB
Abstract:SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.
Item Type:Article
Copyright:© 2012 Springer
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/80023
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page