Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavior by analysing SCADA system logs. We present MEDUSA, an anomaly-based tool for detecting user actions that may negatively impact the system. © 2010 Springer-Verlag.
CITATION STYLE
Hadžiosmanović, D., Bolzoni, D., & Hartel, P. (2010). MEDUSA: Mining events to detect undesirable uSer actions in SCADA. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6307 LNCS, pp. 500–501). Springer Verlag. https://doi.org/10.1007/978-3-642-15512-3_33
Mendeley helps you to discover research relevant for your work.