Standard approaches for detecting malicious behaviors, e.g.
monitoring network traffic, cannot address process-related threats in
SCADA(Supervisory Control And Data Acquisition) systems. These
threats take place when an attacker gains user access rights and performs
actions which look legitimate, but which can disrupt the industrial process.
We believe that it is possible to detect such behavior by analysing
SCADA system logs. We present MEDUSA, an anomaly-based tool for
detecting user actions that may negatively impact the system.
|Name||Lecture Notes in Computer Science|
|Conference||13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010|
|Period||15/09/10 → 17/09/10|
|Other||15-17 Sep 2010|