MEDUSA: Mining events to detect undesirable uSer actions in SCADA

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavior by analysing SCADA system logs. We present MEDUSA, an anomaly-based tool for detecting user actions that may negatively impact the system. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Hadžiosmanović, D., Bolzoni, D., & Hartel, P. (2010). MEDUSA: Mining events to detect undesirable uSer actions in SCADA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6307 LNCS, pp. 500–501). Springer Verlag. https://doi.org/10.1007/978-3-642-15512-3_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free