Abstract
Network security monitoring in ICS, or SCADA, networks provides opportunities and corresponding challenges. Anomaly detection using machine learning has traditionally performed sub-optimally when brought out of the laboratory environments and into more open networks. We have proposed using machine learning for anomaly detection in ICS networks when certain prerequisites are met, e.g. predictability. Results are reported for validation of a previously introduced ML module for Bro NSM using captures from an operational ICS network. The number of false positives and the detection capability are reported on. Parts of the used packet capture files include reconnaissance activity. The results point to adequate initial capability. The system is functional, usable and ready for further development. Easily modified and configured module represents a proof-of-concept implementation of introduced event-driven machine learning based anomaly detection concept for single event and algorithm.
Original language | English |
---|---|
Title of host publication | Risks and Security of Internet and Systems |
Subtitle of host publication | CRiSIS 2014 |
Publisher | Springer |
Pages | 1-16 |
ISBN (Electronic) | 978-3-319-17127-2 |
ISBN (Print) | 978-3-319-17126-5 |
DOIs | |
Publication status | Published - 28 Apr 2015 |
MoE publication type | A4 Article in a conference publication |
Event | 9th International Conference on Risks and Security of Internet and Systems, CRiSIS 2014 - Trento, Italy Duration: 27 Aug 2015 → 29 Aug 2015 Conference number: 9 |
Publication series
Series | Lecture Notes in Computer Science |
---|---|
Volume | 8924 |
ISSN | 0302-9743 |
Conference
Conference | 9th International Conference on Risks and Security of Internet and Systems, CRiSIS 2014 |
---|---|
Abbreviated title | CRiSIS 2014 |
Country/Territory | Italy |
City | Trento |
Period | 27/08/15 → 29/08/15 |
Keywords
- anomaly detection
- cybersecurity
- ICS network
- machine learning
- network security monitoring
- SCADA network