首页> 外文会议>IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks >Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems
【24h】

Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems

机译:评估工业控制系统的基于异常的入侵检测配置

获取原文

摘要

To reduce cost and ease maintenance, industrial control systems (ICS) have adopted Ethernetbased interconnections that integrate operational technology (OT) systems with information technology (IT) networks. This integration has made these critical systems vulnerable to attack. Security solutions tailored to ICS environments are an active area of research. Anomalybased network intrusion detection systems are well-suited for these environments. Often these systems must be optimized for their specific environment. In prior work, we introduced a method for assessing the impact of various anomaly-based network IDS settings on security. This paper reviews the experimental outcomes when we applied our method to a full-scale ICS test bed using actual attacks. Our method provides new and valuable data to operators enabling more informed decisions about IDS configurations.
机译:为了降低成本并简化维护,工业控制系统(ICS)已采用基于以太网的互连,该互连将运营技术(OT)系统与信息技术(IT)网络集成在一起。这种集成使这些关键系统容易受到攻击。针对ICS环境量身定制的安全解决方案是研究的活跃领域。基于异常的网络入侵检测系统非常适合这些环境。通常,这些系统必须针对其特定环境进行优化。在先前的工作中,我们介绍了一种评估各种基于异常的网络IDS设置对安全性影响的方法。当我们使用实际攻击将我们的方法应用于全面ICS测试平台时,本文将回顾实验结果。我们的方法为运营商提供了新的有价值的数据,使他们能够对IDS配置做出更明智的决策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号