Please use this identifier to cite or link to this item:
https://hdl.handle.net/10316/114477
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rosa, Luis | - |
dc.contributor.author | Cruz, Tiago J. | - |
dc.contributor.author | Simões, Paulo | - |
dc.contributor.author | Monteiro, Edmundo | - |
dc.date.accessioned | 2024-03-28T09:54:56Z | - |
dc.date.available | 2024-03-28T09:54:56Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://hdl.handle.net/10316/114477 | - |
dc.description.abstract | In the domain of Industrial Automation and Control Systems (IACS), security was traditionally downplayed to a certain extent, as it was originally deemed an exclusive concern of Information and Communications Technology (ICT) systems. The myth of the air-gap, as well as other preconceived notions about implicit IACS security, constituted dangerous fallacies that were debunked once successful attacks become known. Ultimately, the industry started shifting away from this dangerous mindset, discussing how to properly secure those systems. In many ways, IACS security should not be treated differently from modern ICT security. For sure, IACS have distinct characteristics, assets, protocols and even priorities that should be considered – but security should never be an optional concern. In this publication, we present the main results of a PhD dissertation that proposes a holistic and data-driven framework capable of leveraging distinct techniques to increase situational awareness and provide continuous and near real-time monitoring of IACS. For such purposes, it proposes an evolution of the Security Information and Event Management (SIEM) concept, geared towards providing a unified security data monitoring solution by leveraging recent advances in the field of real-time Big Data analytics. In the same way, the most recent machinelearning- based anomaly-detection techniques (which are becoming increasingly prominent in the cybersecurity field) are also analyzed and studied to understand their benefits for developing and advancing IACS cyber-intrusion detection processes. | pt |
dc.language.iso | eng | pt |
dc.publisher | IEEE | pt |
dc.relation | UIDB/00326/2020 | pt |
dc.relation | UIDP/00326/2020 | pt |
dc.relation | H2020 ATENA (H2020-DS-2015-1 Project 700581) | pt |
dc.relation | P2020 Smart5Grid (co-funded by FEDER -Competitiveness and Internationalization Operational Program (COMPETE 2020), Portugal 2020 framework) | pt |
dc.rights | openAccess | pt |
dc.subject | Industrial Automation and Control Systems | pt |
dc.subject | Cybersecurity | pt |
dc.subject | Intrusion Detection | pt |
dc.subject | Real-Time Big Data Analytics | pt |
dc.subject | SCADA Networks | pt |
dc.title | Intrusion and Anomaly Detection in Industrial Automation and Control Systems | pt |
dc.type | article | - |
degois.publication.firstPage | 1 | pt |
degois.publication.lastPage | 6 | pt |
degois.publication.title | Proceedings of IEEE/IFIP Network Operations and Management Symposium 2023, NOMS 2023 | pt |
dc.peerreviewed | yes | pt |
dc.identifier.doi | 10.1109/NOMS56928.2023.10154432 | pt |
dc.date.embargo | 2023-01-01 | * |
uc.date.periodoEmbargo | 0 | pt |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.openairetype | article | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | Com Texto completo | - |
crisitem.author.researchunit | CISUC - Centre for Informatics and Systems of the University of Coimbra | - |
crisitem.author.researchunit | CISUC - Centre for Informatics and Systems of the University of Coimbra | - |
crisitem.author.parentresearchunit | Faculty of Sciences and Technology | - |
crisitem.author.parentresearchunit | Faculty of Sciences and Technology | - |
crisitem.author.orcid | 0000-0002-8230-4045 | - |
crisitem.author.orcid | 0000-0001-9278-6503 | - |
crisitem.author.orcid | 0000-0002-5079-8327 | - |
crisitem.author.orcid | 0000-0003-1615-2925 | - |
Appears in Collections: | I&D CISUC - Artigos em Revistas Internacionais |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Intrusion_and_Anomaly_Detection_in_Industrial_Automation_and_Control_Systems.pdf | 430.17 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.