Intrusion Detection and Event Monitoring in SCADA Networks View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007

AUTHORS

Paul Oman , Matthew Phillips

ABSTRACT

This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks More... »

PAGES

161-173

Book

TITLE

Critical Infrastructure Protection

ISBN

978-0-387-75461-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12

DOI

http://dx.doi.org/10.1007/978-0-387-75462-8_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1025907742


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Idaho", 
          "id": "https://www.grid.ac/institutes/grid.266456.5", 
          "name": [
            "Computer Science, University of Idaho, Moscow, Idaho, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Oman", 
        "givenName": "Paul", 
        "id": "sg:person.01103404064.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01103404064.49"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Idaho", 
          "id": "https://www.grid.ac/institutes/grid.266456.5", 
          "name": [
            "Computer Science, University of Idaho, Moscow, Idaho, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Phillips", 
        "givenName": "Matthew", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/iaw.2004.1437837", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093580314"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iaw.2004.1437837", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093580314"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks", 
    "editor": [
      {
        "familyName": "Goetz", 
        "givenName": "Eric", 
        "type": "Person"
      }, 
      {
        "familyName": "Shenoi", 
        "givenName": "Sujeet", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-75462-8_12", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-0-387-75461-1"
      ], 
      "name": "Critical Infrastructure Protection", 
      "type": "Book"
    }, 
    "name": "Intrusion Detection and Event Monitoring in SCADA Networks", 
    "pagination": "161-173", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1025907742"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-75462-8_12"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "7b6cf432135faba28e608fbe0eaf9b57bd8ae9650696a6d7fc973b9f9aa5acce"
        ]
      }
    ], 
    "publisher": {
      "location": "Boston, MA", 
      "name": "Springer US", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-75462-8_12", 
      "https://app.dimensions.ai/details/publication/pub.1025907742"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:31", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000356_0000000356/records_57895_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-0-387-75462-8_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-75462-8_12'


 

This table displays all metadata directly associated to this object as RDF triples.

78 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-75462-8_12 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N0e0bc599a78e4d379767262602d45535
4 schema:citation https://doi.org/10.1109/iaw.2004.1437837
5 schema:datePublished 2007
6 schema:datePublishedReg 2007-01-01
7 schema:description This paper describes the implementation of a customized intrusion detection and event monitoring system for a SCADA/sensor testbed. The system raises alerts upon detecting potential unauthorized access and changes in device settings. By markedly increasing the logging of critical network events, the system shows dramatic improvements in both the security and overall auditing capabilities. In addition to its role in securing SCADA networks, the system assists operators in identifying common configuration errors. Keywords: Intrusion detection, real-time monitoring, SCADA networks
8 schema:editor Nfeb4c40da7354566b0a292c48a361000
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree true
12 schema:isPartOf N33d7e3cfd7be4640928f7f422f8e824c
13 schema:name Intrusion Detection and Event Monitoring in SCADA Networks
14 schema:pagination 161-173
15 schema:productId N461713704d9f4d0a9f545e9a7560d990
16 N4b32428cb340467cbe37057808a18a13
17 Nf967c47041ab48b3a533bbd647fe8e0e
18 schema:publisher N65d048c6733746a99d886ca6ea05d1bf
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025907742
20 https://doi.org/10.1007/978-0-387-75462-8_12
21 schema:sdDatePublished 2019-04-16T07:31
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher Nbfa279060cdc4df9add84cf2e68c6da8
24 schema:url https://link.springer.com/10.1007%2F978-0-387-75462-8_12
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N0e0bc599a78e4d379767262602d45535 rdf:first sg:person.01103404064.49
29 rdf:rest N81b02f46a8be419686dbd283e1325187
30 N33d7e3cfd7be4640928f7f422f8e824c schema:isbn 978-0-387-75461-1
31 schema:name Critical Infrastructure Protection
32 rdf:type schema:Book
33 N461713704d9f4d0a9f545e9a7560d990 schema:name dimensions_id
34 schema:value pub.1025907742
35 rdf:type schema:PropertyValue
36 N4b32428cb340467cbe37057808a18a13 schema:name doi
37 schema:value 10.1007/978-0-387-75462-8_12
38 rdf:type schema:PropertyValue
39 N4b870d23b87e447fb896462721e3ed7c schema:familyName Goetz
40 schema:givenName Eric
41 rdf:type schema:Person
42 N5cd100cdbc0c4bb9956e8490065cc096 schema:familyName Shenoi
43 schema:givenName Sujeet
44 rdf:type schema:Person
45 N65d048c6733746a99d886ca6ea05d1bf schema:location Boston, MA
46 schema:name Springer US
47 rdf:type schema:Organisation
48 N81b02f46a8be419686dbd283e1325187 rdf:first Nf00ffca8025a4af39b568139acf31f9a
49 rdf:rest rdf:nil
50 Nab7e4c40bab34532956b85442ba658a0 rdf:first N5cd100cdbc0c4bb9956e8490065cc096
51 rdf:rest rdf:nil
52 Nbfa279060cdc4df9add84cf2e68c6da8 schema:name Springer Nature - SN SciGraph project
53 rdf:type schema:Organization
54 Nf00ffca8025a4af39b568139acf31f9a schema:affiliation https://www.grid.ac/institutes/grid.266456.5
55 schema:familyName Phillips
56 schema:givenName Matthew
57 rdf:type schema:Person
58 Nf967c47041ab48b3a533bbd647fe8e0e schema:name readcube_id
59 schema:value 7b6cf432135faba28e608fbe0eaf9b57bd8ae9650696a6d7fc973b9f9aa5acce
60 rdf:type schema:PropertyValue
61 Nfeb4c40da7354566b0a292c48a361000 rdf:first N4b870d23b87e447fb896462721e3ed7c
62 rdf:rest Nab7e4c40bab34532956b85442ba658a0
63 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
64 schema:name Information and Computing Sciences
65 rdf:type schema:DefinedTerm
66 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
67 schema:name Artificial Intelligence and Image Processing
68 rdf:type schema:DefinedTerm
69 sg:person.01103404064.49 schema:affiliation https://www.grid.ac/institutes/grid.266456.5
70 schema:familyName Oman
71 schema:givenName Paul
72 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01103404064.49
73 rdf:type schema:Person
74 https://doi.org/10.1109/iaw.2004.1437837 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093580314
75 rdf:type schema:CreativeWork
76 https://www.grid.ac/institutes/grid.266456.5 schema:alternateName University of Idaho
77 schema:name Computer Science, University of Idaho, Moscow, Idaho, USA
78 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...