Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting

09/02/2019
by   Junaid Chaudhry, et al.
0

While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incor-porate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although wrapping the SCADA traffic in a protective IPsec stream is an obvious choice, thin clients and unreliable communication channels make is less than ideal to use crypto-graphic solutions for security SCADA traffic. In this paper, we propose a smart alternative of data obfuscation in the form of Impulsive Statistical Fingerprinting (ISF). We provide important insights into our research in healthcare SCADA data security and the use of ISF. We substantiate the conversion of sensor data through the ISF into HL7 format and define policies of a seamless switch to a non HL7-based non-secure HIS to a secure HIS.

READ FULL TEXT
research
05/04/2018

SecureCloud: Secure Big Data Processing in Untrusted Clouds

We present the SecureCloud EU Horizon 2020 project, whose goal is to ena...
research
04/13/2021

A multiagent based framework secured with layered SVM-based IDS for remote healthcare systems

Since the number of elderly and patients who are in hospitals and health...
research
07/14/2022

A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering

A covert attack method often used by APT organizations is the DNS tunnel...
research
03/09/2020

Secure Traffic Lights: Replay Attack Detection for Model-based Smart Traffic Controllers

Rapid urbanization calls for smart traffic management solutions that inc...
research
05/18/2022

Monitoring Security of Enterprise Hosts via DNS Data Analysis

Enterprise Networks are growing in scale and complexity, with heterogene...
research
11/14/2019

Detecting Safety and Security Faults in PLC Systems with Data Provenance

Programmable Logic Controllers are an integral component for managing ma...

Please sign up or login with your details

Forgot password? Click here to reset