Industrial Control System Monitoring Based on Communication Profile
-
- Matta Masafumi
- Nagoya Institute of Technology
-
- Koike Masato
- Nagoya Institute of Technology
-
- Machii Wataru
- Nagoya Institute of Technology
-
- Aoyama Tomomi
- Nagoya Institute of Technology
-
- Naruoka Hidemasa
- Nagoya Institute of Technology
-
- Koshijima Ichiro
- Nagoya Institute of Technology
-
- Hashimoto Yoshihiro
- Nagoya Institute of Technology
Search this article
Abstract
Industrial control systems (ICS) have hidden vulnerabilities that cannot be usually solved by IT security tools, because of their 24 h 365 d non-stop, non-update and non-patch operation. There is, however, very limited report of cyber-attacks, so that owners of critical infrastructures do not have much attention for their ICS protection. This is a kind of misunderstanding of the current situation caused by a lacking of capability to detect a cyber-intrusion. In order to apply an Intrusion Detection System (IDS), it is difficult to make the complete white list of communication packets, and it is also difficult to perform anomaly detection by checking the payload of packet one by one. This paper defines characteristics of communication in the ICS network and proposes a methodology to visualize the ICS network behavior. An illustrative example of pseudo cyber-attack is also prepared for understanding our proposed method.
Journal
-
- JOURNAL OF CHEMICAL ENGINEERING OF JAPAN
-
JOURNAL OF CHEMICAL ENGINEERING OF JAPAN 48 (8), 619-625, 2015
The Society of Chemical Engineers, Japan
- Tweet
Details 詳細情報について
-
- CRID
- 1390001204569091584
-
- NII Article ID
- 130005093996
-
- NII Book ID
- AA00709658
-
- ISSN
- 18811299
- 00219592
-
- NDL BIB ID
- 027013223
-
- Text Lang
- en
-
- Data Source
-
- JaLC
- NDL
- Crossref
- CiNii Articles
- KAKEN
-
- Abstract License Flag
- Disallowed