Probability Risk Identification Based Intrusion Detection System for SCADA Systems

11/08/2017
by   Thomas Marsden, et al.
0

. As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cyber adversaries. This paper suggests a Probability Risk Identification based Intrusion Detection System (PRI-IDS) technique based on analysing network traffic of Modbus TCP/IP for identifying replay attacks. It is acknowledged that Modbus TCP is usually vulnerable due to its unauthenticated and unencrypted nature. Our technique is evaluated using a simulation environment by configuring a testbed, which is a cus- tom SCADA network that is cheap, accurate and scalable. The testbed is exploited when testing the IDS by sending individual packets from an attacker located on the same LAN as the Modbus master and slave. The experimental results demonstrated that the proposed technique can effectively and efficiently recognise replay attacks.

READ FULL TEXT
research
09/12/2022

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP'99 and NSL-KDD Datasets: A Comprehensive Survey

With the growing rates of cyber-attacks and cyber espionage, the need fo...
research
11/08/2017

Privacy Preservation Intrusion Detection Technique for SCADA Systems

Supervisory Control and Data Acquisition (SCADA) systems face the absenc...
research
07/27/2021

Intrusion Detection with Machine Learning Using Open-Sourced Datasets

No significant research has been conducted so far on Intrusion detection...
research
09/06/2021

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

The rapid increase in the use of IoT devices brings many benefits to the...
research
08/24/2021

GGNB: Graph-Based Gaussian Naive Bayes Intrusion Detection System for CAN Bus

The national highway traffic safety administration (NHTSA) identified cy...
research
02/18/2020

Cyberattack Action-Intent-Framework for Mapping Intrusion Observables

The techniques and tactics used by cyber adversaries are becoming more s...
research
10/24/2017

Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection

We consider the problem of approximate reduction of non-deterministic au...

Please sign up or login with your details

Forgot password? Click here to reset