We address the detection of process-related threats
in control systems used in critical infrastructures. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the industrial process. We use logs to detect anomalous patterns of user actions on process control application. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.
|Publisher||IEEE Computer Society|
|Conference||European Conference on Computer Network Defense, EC2ND 2011|
|Period||6/09/11 → 8/09/11|
|Other||6-8 Sept 2011|
- pattern mining