Intrusion Detection for Sequence-Based Attacks with Reduced Traffic Models

被引:6
|
作者
Ferling, Benedikt [1 ]
Chromik, Justyna [2 ]
Caselli, Marco [3 ]
Remke, Anne [1 ,2 ]
机构
[1] Westfalische Wilhelms Univ Munster, Munster, Germany
[2] Univ Twente, Enschede, Netherlands
[3] Siemens AG, Munich, Germany
关键词
D O I
10.1007/978-3-319-74947-1_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Securing control networks (e.g. for power and gas distribution) requires dedicated approaches. Sequence-aware intrusion detection models the network traffic under normal operation to identify malicious behavior. Unfortunately, such models are often large and difficult to handle. This paper proposes a method that generates smaller traffic models and discusses the accuracy of those reduced models in the context of a real control infrastructure employing the IEC 60870-5-104 protocol.
引用
收藏
页码:53 / 67
页数:15
相关论文
共 50 条
  • [41] Soft Computing Techniques for Intrusion Detection of SQL-Based Attacks
    Skaruz, Jaroslaw
    Nowacki, Jerzy Pawel
    Drabik, Aldona
    Seredynski, Franciszek
    Bouvry, Pascal
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT I, PROCEEDINGS, 2010, 5990 : 33 - +
  • [42] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Omar E. Elejla
    Bahari Belaton
    Mohammed Anbar
    Ahmad Alnajjar
    [J]. Neural Computing and Applications, 2018, 30 : 45 - 56
  • [43] Intrusion Detection Systems of ICMPv6-based DDoS attacks
    Elejla, Omar E.
    Belaton, Bahari
    Anbar, Mohammed
    Alnajjar, Ahmad
    [J]. NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01): : 45 - 56
  • [44] DoS Attacks Intrusion Detection Algorithm Based on Support Vector Machine
    Wang, Lingren
    Li, Jingbing
    Cheng, Jieren
    Bhatti, Uzair Aslam
    Dai, Qianning
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 286 - 297
  • [45] A Hybrid Intrusion Detection Model for Web Log-Based Attacks
    Zou, Junwei
    Tao, Dan
    Yu, Jing
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 887 - 895
  • [46] Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism
    Kuo, Shu-Yu
    Tseng, Fan-Hsun
    Chou, Yao-Hsin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 143 : 179 - 190
  • [47] Intrusion detection in cloud computing based attacks patterns and risk assessment
    Ben Charhi, Youssef
    Mannane, Nada
    Bendriss, Elmehdi
    Regragui, Boubker
    [J]. PROCEEDINGS OF 2016 THIRD INTERNATIONAL CONFERENCE ON SYSTEMS OF COLLABORATION (SYSCO), 2016, : P92 - P95
  • [48] FPGA based intrusion detection system against unknown and known attacks
    Kang, Dong-Ho
    Kim, Byoung-Koo
    Oh, Jin-Tae
    Nam, Taek-Yong
    Jang, Jong-Soo
    [J]. AGENT COMPUTING AND MULTI-AGENT SYSTEMS, 2006, 4088 : 801 - 806
  • [49] Parameterizing poisoning attacks in federated learning-based intrusion detection
    Merzouk, Mohamed Amine
    Cuppens, Frederic
    Boulahia-Cuppens, Nora
    Yaich, Reda
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [50] Neural network models for sequence-based TCR and HLA association prediction
    Liu, Si
    Bradley, Philip
    Sun, Wei
    [J]. PLOS COMPUTATIONAL BIOLOGY, 2023, 19 (11)