A log mining approach for process monitoring in SCADA

被引:0
|
作者
Dina Hadžiosmanović
Damiano Bolzoni
Pieter H. Hartel
机构
[1] University of Twente,
关键词
ICS; SCADA; Security; SCADA log; Log analysis; Frequent pattern mining; Process related threat; HAZOP; PHEA; MELISSA;
D O I
暂无
中图分类号
学科分类号
摘要
SCADA (supervisory control and data acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.
引用
收藏
页码:231 / 251
页数:20
相关论文
共 50 条
  • [21] Behavioral and Performance Analysis of a Real-Time Case Study Event Log: A Process Mining Approach
    Butt, Naveed Anwer
    Mahmood, Zafar
    Sana, Muhammad Usman
    Diez, Isabel de la Torre
    Galan, Juan Castanedo
    Brie, Santiago
    Ashraf, Imran
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [22] The Proposal of the Monitoring System of the Annealing Process in the SCADA system Promotic
    Durdan, Milan
    Kacur, Jan
    Laciak, Marek
    PROCEEDINGS OF THE 2013 14TH INTERNATIONAL CARPATHIAN CONTROL CONFERENCE (ICCC), 2013, : 68 - 72
  • [23] Wind Turbine Condition Monitoring Using SCADA Data and Data Mining Method
    Pei, Yan
    Qian, Zheng
    Tao, Siyu
    Yu, Hao
    2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3760 - 3764
  • [24] Building a valuable event log for process mining: an experimental exploration of a guided process
    Jans, Mieke
    Soffer, Pnina
    Jouck, Toon
    ENTERPRISE INFORMATION SYSTEMS, 2019, 13 (05) : 601 - 630
  • [25] Improved Log Data-Merging Method for Process Mining
    Xu Y.
    Lin Q.
    Li D.
    Li, Dong (cslidong@scut.edu.cn), 1600, South China University of Technology (45): : 112 - 117
  • [26] Auditor Choices during Event Log Building for Process Mining
    Jans, Mieke
    JOURNAL OF EMERGING TECHNOLOGIES IN ACCOUNTING, 2019, 16 (02) : 59 - 67
  • [27] The Development of the Process Mining Event Log Generator (PMELG) Tool
    Hawkins, Steven R.
    Pickerd, Jeffrey
    Summers, Scott L.
    Wood, David A.
    ACCOUNTING HORIZONS, 2023, 37 (04) : 85 - 95
  • [28] Case of Process Mining from Business Execution Log Data
    Bae, Joonsoo
    Kang, Young Ki
    INTELLIGENT DECISION TECHNOLOGIES (IDT'2012), VOL 1, 2012, 15 : 419 - 425
  • [29] Log File Anomaly Detection Based on Process Mining Graphs
    Luftensteiner, Sabrina
    Praher, Patrick
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2022 WORKSHOPS, 2022, 1633 : 383 - 391
  • [30] Wind turbine condition monitoring by the approach of SCADA data analysis
    Yang, Wenxian
    Court, Richard
    Jiang, Jiesheng
    RENEWABLE ENERGY, 2013, 53 : 365 - 376