An intrusion detection system for wireless process control systems
A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is pa...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 872 |
---|---|
container_issue | |
container_start_page | 866 |
container_title | |
container_volume | |
creator | Roosta, T. Nilsson, D.K. Lindqvist, U. Valdes, A. |
description | A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks. |
doi_str_mv | 10.1109/MAHSS.2008.4660125 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>swepub_6IE</sourceid><recordid>TN_cdi_ieee_primary_4660125</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4660125</ieee_id><sourcerecordid>oai_research_chalmers_se_131c5bda_3d40_45d1_84f7_b0026fc9ac05</sourcerecordid><originalsourceid>FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</originalsourceid><addsrcrecordid>eNo90E1PwkAQBuD1g0RA_oBe-geKs-3sdveIRsUE4wE9b_Yz1BRKdksI_14akNM7yTvzHIaQBwpTSkE-fc7my-W0ABBT5Bxowa7IiGKBWLCK0WsyLChjORcUb8hEVuK_w-r20gEfkFFvSEBEdkcmKf0CHDXBCwlD8jzbZPWmi7tUt5vM-c7brp_SIXV-nYU2Zvs6-sanlG1ja_u07fGgbc476Z4Mgm6Sn5xzTH7eXr9f5vni6_3jZbbIbQnQ5cE6IStjQLDCaVsayp3gVUBJTQiVDlWwELRzBlGI4LwHkMGgdVpyQFaOyfLkpr3f7ozaxnqt40G1ulbRJ6-jXSm70s3ax6SSV7SklhmnVekQFDJHlcBQKQNQ8GClttCrjye19t5fzPPHyz9CenB0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An intrusion detection system for wireless process control systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</creator><creatorcontrib>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</creatorcontrib><description>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</description><identifier>ISSN: 2155-6806</identifier><identifier>ISBN: 9781424425747</identifier><identifier>ISBN: 1424425743</identifier><identifier>ISBN: 1424425751</identifier><identifier>ISBN: 9781424425754</identifier><identifier>EISSN: 2155-6814</identifier><identifier>EISBN: 1424425751</identifier><identifier>EISBN: 9781424425754</identifier><identifier>DOI: 10.1109/MAHSS.2008.4660125</identifier><identifier>LCCN: 2008904445</identifier><language>eng</language><publisher>IEEE</publisher><subject>Intrusion detection ; Monitoring ; Process control ; SCADA systems ; Security ; Wireless communication ; Wireless sensor networks</subject><ispartof>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, p.866-872</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4660125$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,883,2054,4038,4039,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4660125$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://research.chalmers.se/publication/74748$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Roosta, T.</creatorcontrib><creatorcontrib>Nilsson, D.K.</creatorcontrib><creatorcontrib>Lindqvist, U.</creatorcontrib><creatorcontrib>Valdes, A.</creatorcontrib><title>An intrusion detection system for wireless process control systems</title><title>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</title><addtitle>MAHSS</addtitle><description>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</description><subject>Intrusion detection</subject><subject>Monitoring</subject><subject>Process control</subject><subject>SCADA systems</subject><subject>Security</subject><subject>Wireless communication</subject><subject>Wireless sensor networks</subject><issn>2155-6806</issn><issn>2155-6814</issn><isbn>9781424425747</isbn><isbn>1424425743</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo90E1PwkAQBuD1g0RA_oBe-geKs-3sdveIRsUE4wE9b_Yz1BRKdksI_14akNM7yTvzHIaQBwpTSkE-fc7my-W0ABBT5Bxowa7IiGKBWLCK0WsyLChjORcUb8hEVuK_w-r20gEfkFFvSEBEdkcmKf0CHDXBCwlD8jzbZPWmi7tUt5vM-c7brp_SIXV-nYU2Zvs6-sanlG1ja_u07fGgbc476Z4Mgm6Sn5xzTH7eXr9f5vni6_3jZbbIbQnQ5cE6IStjQLDCaVsayp3gVUBJTQiVDlWwELRzBlGI4LwHkMGgdVpyQFaOyfLkpr3f7ozaxnqt40G1ulbRJ6-jXSm70s3ax6SSV7SklhmnVekQFDJHlcBQKQNQ8GClttCrjye19t5fzPPHyz9CenB0</recordid><startdate>200809</startdate><enddate>200809</enddate><creator>Roosta, T.</creator><creator>Nilsson, D.K.</creator><creator>Lindqvist, U.</creator><creator>Valdes, A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>ADTPV</scope><scope>BNKNJ</scope><scope>F1S</scope></search><sort><creationdate>200809</creationdate><title>An intrusion detection system for wireless process control systems</title><author>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Intrusion detection</topic><topic>Monitoring</topic><topic>Process control</topic><topic>SCADA systems</topic><topic>Security</topic><topic>Wireless communication</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Roosta, T.</creatorcontrib><creatorcontrib>Nilsson, D.K.</creatorcontrib><creatorcontrib>Lindqvist, U.</creatorcontrib><creatorcontrib>Valdes, A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>SwePub</collection><collection>SwePub Conference</collection><collection>SWEPUB Chalmers tekniska högskola</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Roosta, T.</au><au>Nilsson, D.K.</au><au>Lindqvist, U.</au><au>Valdes, A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An intrusion detection system for wireless process control systems</atitle><btitle>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</btitle><stitle>MAHSS</stitle><date>2008-09</date><risdate>2008</risdate><spage>866</spage><epage>872</epage><pages>866-872</pages><issn>2155-6806</issn><eissn>2155-6814</eissn><isbn>9781424425747</isbn><isbn>1424425743</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><eisbn>1424425751</eisbn><eisbn>9781424425754</eisbn><abstract>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</abstract><pub>IEEE</pub><doi>10.1109/MAHSS.2008.4660125</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2155-6806 |
ispartof | 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, p.866-872 |
issn | 2155-6806 2155-6814 |
language | eng |
recordid | cdi_ieee_primary_4660125 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Intrusion detection Monitoring Process control SCADA systems Security Wireless communication Wireless sensor networks |
title | An intrusion detection system for wireless process control systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T21%3A07%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-swepub_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20intrusion%20detection%20system%20for%20wireless%20process%20control%20systems&rft.btitle=2008%205th%20IEEE%20International%20Conference%20on%20Mobile%20Ad%20Hoc%20and%20Sensor%20Systems&rft.au=Roosta,%20T.&rft.date=2008-09&rft.spage=866&rft.epage=872&rft.pages=866-872&rft.issn=2155-6806&rft.eissn=2155-6814&rft.isbn=9781424425747&rft.isbn_list=1424425743&rft.isbn_list=1424425751&rft.isbn_list=9781424425754&rft_id=info:doi/10.1109/MAHSS.2008.4660125&rft_dat=%3Cswepub_6IE%3Eoai_research_chalmers_se_131c5bda_3d40_45d1_84f7_b0026fc9ac05%3C/swepub_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424425751&rft.eisbn_list=9781424425754&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4660125&rfr_iscdi=true |