skip to content
Questions About Electronic Access? Click Here Cyberthreats, attacks and intrusion detection... Preview this item
ClosePreview this item
Checking...

Cyberthreats, attacks and intrusion detection in supervisory control and data acquisition networks

Author: Wei Gao; Mississippi State University,; Mississippi State University. Department of Electrical and Computer Engineering,
Publisher: Mississippi State : Mississippi State University, 2013.
Dissertation: Thesis (Ph.D.) Mississippi State University. Department of Electrical and Computer Engineering 2013.
Edition/Format:   Thesis/dissertation : Document : Thesis/dissertation : eBook   Computer File : English
Summary:
Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems that interconnect and monitor remote physical processes. There have been many real world documented incidents and cyber-attacks affecting SCADA systems, which clearly illustrate critical infrastructure vulnerabilities. These reported incidents demonstrate that cyber-attacks against SCADA systems might produce a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Academic theses
Material Type: Document, Thesis/dissertation, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Wei Gao; Mississippi State University,; Mississippi State University. Department of Electrical and Computer Engineering,
OCLC Number: 868032201
Notes: Title from PDF title screen (viewed on October 31, 2016).
Description: 1 online resource (vii, 134 pages) : illustrations (some color)
Details: Mode of access: Internet via the World Wide Web.; System requirements: Internet connectivity; World Wide Web browser software; Adobe Acrobat Reader.
Responsibility: by Wei Gao.
More information:

Abstract:

Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems that interconnect and monitor remote physical processes. There have been many real world documented incidents and cyber-attacks affecting SCADA systems, which clearly illustrate critical infrastructure vulnerabilities. These reported incidents demonstrate that cyber-attacks against SCADA systems might produce a variety of financial damage and harmful events to humans and their environment. This dissertation documents four contributions towards increased security for SCADA systems. First, a set of cyber-attacks was developed. Second, each attack was executed against two fully functional SCADA systems in a laboratory environment; a gas pipeline and a water storage tank. Third, signature based intrusion detection system rules were developed and tested which can be used to generate alerts when the aforementioned attacks are executed against a SCADA system. Fourth, a set of features was developed for a decision tree based anomaly based intrusion detection system. The features were tested using the datasets developed for this work. This dissertation documents cyber-attacks on both serial based and Ethernet based SCADA networks. Four categories of attacks against SCADA systems are discussed: reconnaissance, malicious response injection, malicious command injection and denial of service. In order to evaluate performance of data mining and machine learning algorithms for intrusion detection systems in SCADA systems, a network dataset to be used for benchmarking intrusion detection systems was generated. This network dataset includes different classes of attacks that simulate different attack scenarios on process control systems. This dissertation describes four SCADA network intrusion detection datasets; a full and abbreviated dataset for both the gas pipeline and water storage tank systems. Each feature in the dataset is captured from network flow records. This dataset groups two different categories of features that can be used as input to an intrusion detection system. First, network traffic features describe the communication patterns in a SCADA system. This research developed both signature based IDS and anomaly based IDS for the gas pipeline and water storage tank serial based SCADA systems. The performance of both types of IDS were evaluates by measuring detection rate and the prevalence of false positives.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/868032201> # Cyberthreats, attacks and intrusion detection in supervisory control and data acquisition networks
    a pto:Web_document, schema:Book, schema:CreativeWork, schema:MediaObject, bgn:Thesis ;
   bgn:inSupportOf "" ;
   library:oclcnum "868032201" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/msu> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1760319682#Thing/intrusion_detection_system> ; # Intrusion detection system
   schema:about <http://experiment.worldcat.org/entity/work/data/1760319682#Thing/dataset> ; # Dataset
   schema:about <http://experiment.worldcat.org/entity/work/data/1760319682#Thing/network_security> ; # Network security
   schema:about <http://experiment.worldcat.org/entity/work/data/1760319682#Thing/scada> ; # SCADA
   schema:about <http://experiment.worldcat.org/entity/work/data/1760319682#Thing/vulnerability> ; # Vulnerability
   schema:author <http://experiment.worldcat.org/entity/work/data/1760319682#Person/gao_wei_1985> ; # Wei Gao
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1760319682#Organization/mississippi_state_university> ; # Mississippi State University,
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1760319682#Organization/mississippi_state_university_department_of_electrical_and_computer_engineering> ; # Mississippi State University. Department of Electrical and Computer Engineering,
   schema:datePublished "2013" ;
   schema:description "Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems that interconnect and monitor remote physical processes. There have been many real world documented incidents and cyber-attacks affecting SCADA systems, which clearly illustrate critical infrastructure vulnerabilities. These reported incidents demonstrate that cyber-attacks against SCADA systems might produce a variety of financial damage and harmful events to humans and their environment. This dissertation documents four contributions towards increased security for SCADA systems. First, a set of cyber-attacks was developed. Second, each attack was executed against two fully functional SCADA systems in a laboratory environment; a gas pipeline and a water storage tank. Third, signature based intrusion detection system rules were developed and tested which can be used to generate alerts when the aforementioned attacks are executed against a SCADA system. Fourth, a set of features was developed for a decision tree based anomaly based intrusion detection system. The features were tested using the datasets developed for this work. This dissertation documents cyber-attacks on both serial based and Ethernet based SCADA networks. Four categories of attacks against SCADA systems are discussed: reconnaissance, malicious response injection, malicious command injection and denial of service. In order to evaluate performance of data mining and machine learning algorithms for intrusion detection systems in SCADA systems, a network dataset to be used for benchmarking intrusion detection systems was generated. This network dataset includes different classes of attacks that simulate different attack scenarios on process control systems. This dissertation describes four SCADA network intrusion detection datasets; a full and abbreviated dataset for both the gas pipeline and water storage tank systems. Each feature in the dataset is captured from network flow records. This dataset groups two different categories of features that can be used as input to an intrusion detection system. First, network traffic features describe the communication patterns in a SCADA system. This research developed both signature based IDS and anomaly based IDS for the gas pipeline and water storage tank serial based SCADA systems. The performance of both types of IDS were evaluates by measuring detection rate and the prevalence of false positives."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1760319682> ;
   schema:genre "Academic theses"@en ;
   schema:inLanguage "en" ;
   schema:name "Cyberthreats, attacks and intrusion detection in supervisory control and data acquisition networks"@en ;
   schema:productID "868032201" ;
   schema:url <http://library.msstate.edu/etd/show.asp?etd=etd-09232013-205355> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/868032201> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1760319682#Organization/mississippi_state_university> # Mississippi State University,
    a schema:Organization ;
   schema:name "Mississippi State University," ;
    .

<http://experiment.worldcat.org/entity/work/data/1760319682#Organization/mississippi_state_university_department_of_electrical_and_computer_engineering> # Mississippi State University. Department of Electrical and Computer Engineering,
    a schema:Organization ;
   schema:name "Mississippi State University. Department of Electrical and Computer Engineering," ;
    .

<http://experiment.worldcat.org/entity/work/data/1760319682#Thing/intrusion_detection_system> # Intrusion detection system
    a schema:Thing ;
   schema:name "Intrusion detection system" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.