Comparison of the intrusion detection system rules in relation with the SCADA systems

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules.

Cite

CITATION STYLE

APA

Vávra, J., & Hromada, M. (2016). Comparison of the intrusion detection system rules in relation with the SCADA systems. In Advances in Intelligent Systems and Computing (Vol. 465, pp. 159–169). Springer Verlag. https://doi.org/10.1007/978-3-319-33622-0_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free