Intrusion Detection and Event Monitoring in SCADA Networks View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007

AUTHORS

Paul Oman , Matthew Phillips

ABSTRACT

This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks More... »

PAGES

161-173

Book

TITLE

Critical Infrastructure Protection

ISBN

978-0-387-75461-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12

DOI

http://dx.doi.org/10.1007/978-0-387-75462-8_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1025907742


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Idaho", 
          "id": "https://www.grid.ac/institutes/grid.266456.5", 
          "name": [
            "Computer Science, University of Idaho, Moscow, Idaho, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Oman", 
        "givenName": "Paul", 
        "id": "sg:person.01103404064.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01103404064.49"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Idaho", 
          "id": "https://www.grid.ac/institutes/grid.266456.5", 
          "name": [
            "Computer Science, University of Idaho, Moscow, Idaho, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Phillips", 
        "givenName": "Matthew", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/iaw.2004.1437837", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093580314"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iaw.2004.1437837", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093580314"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks", 
    "editor": [
      {
        "familyName": "Goetz", 
        "givenName": "Eric", 
        "type": "Person"
      }, 
      {
        "familyName": "Shenoi", 
        "givenName": "Sujeet", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-75462-8_12", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-0-387-75461-1"
      ], 
      "name": "Critical Infrastructure Protection", 
      "type": "Book"
    }, 
    "name": "Intrusion Detection and Event Monitoring in SCADA Networks", 
    "pagination": "161-173", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1025907742"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-75462-8_12"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "7b6cf432135faba28e608fbe0eaf9b57bd8ae9650696a6d7fc973b9f9aa5acce"
        ]
      }
    ], 
    "publisher": {
      "location": "Boston, MA", 
      "name": "Springer US", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-75462-8_12", 
      "https://app.dimensions.ai/details/publication/pub.1025907742"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:31", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57895_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-0-387-75462-8_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'


 

This table displays all metadata directly associated to this object as RDF triples.

78 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-75462-8_12 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N68ad5c83d0154a25acad8262ebf931b1
4 schema:citation https://doi.org/10.1109/iaw.2004.1437837
5 schema:datePublished 2007
6 schema:datePublishedReg 2007-01-01
7 schema:description This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks
8 schema:editor N924ba8606a4a4a33847f66e573dba6b7
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf N023e71e1fd25471bad7d39bef6897ce2
13 schema:name Intrusion Detection and Event Monitoring in SCADA Networks
14 schema:pagination 161-173
15 schema:productId N21b1805edc4540caa888e1bce2390d04
16 Nd00098d5633e44cb919fb0b90e87915b
17 Ndd7621a415644d44a2d75f5e95065ad4
18 schema:publisher N8a9deb6787b145389b1ccb294cbc435e
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025907742
20 https://doi.org/10.1007/978-0-387-75462-8_12
21 schema:sdDatePublished 2019-04-16T07:31
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher Nf452385bc93a46ca8c5fcfc06252f87d
24 schema:url https://link.springer.com/10.1007%2F978-0-387-75462-8_12
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N023e71e1fd25471bad7d39bef6897ce2 schema:isbn 978-0-387-75461-1
29 schema:name Critical Infrastructure Protection
30 rdf:type schema:Book
31 N1bc42283695c4567ae234315f96caa42 schema:affiliation https://www.grid.ac/institutes/grid.266456.5
32 schema:familyName Phillips
33 schema:givenName Matthew
34 rdf:type schema:Person
35 N21b1805edc4540caa888e1bce2390d04 schema:name doi
36 schema:value 10.1007/978-0-387-75462-8_12
37 rdf:type schema:PropertyValue
38 N27ca92da6e094e3485e771c74151d5fd schema:familyName Goetz
39 schema:givenName Eric
40 rdf:type schema:Person
41 N68ad5c83d0154a25acad8262ebf931b1 rdf:first sg:person.01103404064.49
42 rdf:rest Nfe547c4e3c394d76a72bc83bad56109a
43 N79dcde24ee634cfcb17fd2815f687e1d rdf:first Na5cdc21693404493b511695be593d318
44 rdf:rest rdf:nil
45 N8a9deb6787b145389b1ccb294cbc435e schema:location Boston, MA
46 schema:name Springer US
47 rdf:type schema:Organisation
48 N924ba8606a4a4a33847f66e573dba6b7 rdf:first N27ca92da6e094e3485e771c74151d5fd
49 rdf:rest N79dcde24ee634cfcb17fd2815f687e1d
50 Na5cdc21693404493b511695be593d318 schema:familyName Shenoi
51 schema:givenName Sujeet
52 rdf:type schema:Person
53 Nd00098d5633e44cb919fb0b90e87915b schema:name readcube_id
54 schema:value 7b6cf432135faba28e608fbe0eaf9b57bd8ae9650696a6d7fc973b9f9aa5acce
55 rdf:type schema:PropertyValue
56 Ndd7621a415644d44a2d75f5e95065ad4 schema:name dimensions_id
57 schema:value pub.1025907742
58 rdf:type schema:PropertyValue
59 Nf452385bc93a46ca8c5fcfc06252f87d schema:name Springer Nature - SN SciGraph project
60 rdf:type schema:Organization
61 Nfe547c4e3c394d76a72bc83bad56109a rdf:first N1bc42283695c4567ae234315f96caa42
62 rdf:rest rdf:nil
63 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
64 schema:name Information and Computing Sciences
65 rdf:type schema:DefinedTerm
66 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
67 schema:name Artificial Intelligence and Image Processing
68 rdf:type schema:DefinedTerm
69 sg:person.01103404064.49 schema:affiliation https://www.grid.ac/institutes/grid.266456.5
70 schema:familyName Oman
71 schema:givenName Paul
72 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01103404064.49
73 rdf:type schema:Person
74 https://doi.org/10.1109/iaw.2004.1437837 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093580314
75 rdf:type schema:CreativeWork
76 https://www.grid.ac/institutes/grid.266456.5 schema:alternateName University of Idaho
77 schema:name Computer Science, University of Idaho, Moscow, Idaho, USA
78 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...