The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a work in progress for a proof of concept which visualizes network events of an industrial automation system in a 3D fish tank view. It aims to enable an automation operator, who most likely is a non-network-expert, to spot anomalies in network traffic and also to memorise past seen anomalies more easily. The developed solution builds upon three components: a Snort event-log forwarder,...
Industrial control system networks are responsible for the operation of critically important functions of modern societies. In this paper we describe a highly distributable technique with low hardware requirements for mapping the typical network behavior of such stable networks. We propose that this technique is able to detect multiple wide ranging attack scenarios threatening these networks. We then...
Smart grids are the next generation of electrical grids, enabling the better management and leveling of power consumption by suppliers. Via the use of automatic meter reading, smart grid also provides better information to the end-users, making it possible to enhance their energy consumption and adapt it according to the current energy price, availability and other factors. As the grid becomes more...
The nature of the traffic in industrial control system network is markedly different from more open networks. Industrial control system networks should be far more restricted in what types of traffic diversity is present. This enables the usage of approaches that are currently not as feasible in open environments, such as machine learning based anomaly detection. Without proper customization for the...
Detecting network intrusions and anomalies in industrial control systems is growing in urgency. Such systems used to be isolated but are now being connected to the outside world. Even in the case of isolated networks, privileged users may still present various threats to the system, either accidentally or intentionally. Also malfunctions in devices may cause anomalous traffic. Anomaly detection based...
The concept of ‘virtual role’ is used in scientific literature in various ways when focusing on role management. The term often also appears in work which deals with access control and virtual organizations. However, a common definition for the term is missing and no consistent definition work has been done. This paper presents a summary of a systematic literature review that has been done to clarify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.