An intrusion detection system for wireless process control systems

A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is pa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Roosta, T., Nilsson, D.K., Lindqvist, U., Valdes, A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 872
container_issue
container_start_page 866
container_title
container_volume
creator Roosta, T.
Nilsson, D.K.
Lindqvist, U.
Valdes, A.
description A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.
doi_str_mv 10.1109/MAHSS.2008.4660125
format Conference Proceeding
fullrecord <record><control><sourceid>swepub_6IE</sourceid><recordid>TN_cdi_ieee_primary_4660125</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4660125</ieee_id><sourcerecordid>oai_research_chalmers_se_131c5bda_3d40_45d1_84f7_b0026fc9ac05</sourcerecordid><originalsourceid>FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</originalsourceid><addsrcrecordid>eNo90E1PwkAQBuD1g0RA_oBe-geKs-3sdveIRsUE4wE9b_Yz1BRKdksI_14akNM7yTvzHIaQBwpTSkE-fc7my-W0ABBT5Bxowa7IiGKBWLCK0WsyLChjORcUb8hEVuK_w-r20gEfkFFvSEBEdkcmKf0CHDXBCwlD8jzbZPWmi7tUt5vM-c7brp_SIXV-nYU2Zvs6-sanlG1ja_u07fGgbc476Z4Mgm6Sn5xzTH7eXr9f5vni6_3jZbbIbQnQ5cE6IStjQLDCaVsayp3gVUBJTQiVDlWwELRzBlGI4LwHkMGgdVpyQFaOyfLkpr3f7ozaxnqt40G1ulbRJ6-jXSm70s3ax6SSV7SklhmnVekQFDJHlcBQKQNQ8GClttCrjye19t5fzPPHyz9CenB0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An intrusion detection system for wireless process control systems</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</creator><creatorcontrib>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</creatorcontrib><description>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</description><identifier>ISSN: 2155-6806</identifier><identifier>ISBN: 9781424425747</identifier><identifier>ISBN: 1424425743</identifier><identifier>ISBN: 1424425751</identifier><identifier>ISBN: 9781424425754</identifier><identifier>EISSN: 2155-6814</identifier><identifier>EISBN: 1424425751</identifier><identifier>EISBN: 9781424425754</identifier><identifier>DOI: 10.1109/MAHSS.2008.4660125</identifier><identifier>LCCN: 2008904445</identifier><language>eng</language><publisher>IEEE</publisher><subject>Intrusion detection ; Monitoring ; Process control ; SCADA systems ; Security ; Wireless communication ; Wireless sensor networks</subject><ispartof>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, p.866-872</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4660125$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,883,2054,4038,4039,27912,54907</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4660125$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://research.chalmers.se/publication/74748$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Roosta, T.</creatorcontrib><creatorcontrib>Nilsson, D.K.</creatorcontrib><creatorcontrib>Lindqvist, U.</creatorcontrib><creatorcontrib>Valdes, A.</creatorcontrib><title>An intrusion detection system for wireless process control systems</title><title>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</title><addtitle>MAHSS</addtitle><description>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</description><subject>Intrusion detection</subject><subject>Monitoring</subject><subject>Process control</subject><subject>SCADA systems</subject><subject>Security</subject><subject>Wireless communication</subject><subject>Wireless sensor networks</subject><issn>2155-6806</issn><issn>2155-6814</issn><isbn>9781424425747</isbn><isbn>1424425743</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo90E1PwkAQBuD1g0RA_oBe-geKs-3sdveIRsUE4wE9b_Yz1BRKdksI_14akNM7yTvzHIaQBwpTSkE-fc7my-W0ABBT5Bxowa7IiGKBWLCK0WsyLChjORcUb8hEVuK_w-r20gEfkFFvSEBEdkcmKf0CHDXBCwlD8jzbZPWmi7tUt5vM-c7brp_SIXV-nYU2Zvs6-sanlG1ja_u07fGgbc476Z4Mgm6Sn5xzTH7eXr9f5vni6_3jZbbIbQnQ5cE6IStjQLDCaVsayp3gVUBJTQiVDlWwELRzBlGI4LwHkMGgdVpyQFaOyfLkpr3f7ozaxnqt40G1ulbRJ6-jXSm70s3ax6SSV7SklhmnVekQFDJHlcBQKQNQ8GClttCrjye19t5fzPPHyz9CenB0</recordid><startdate>200809</startdate><enddate>200809</enddate><creator>Roosta, T.</creator><creator>Nilsson, D.K.</creator><creator>Lindqvist, U.</creator><creator>Valdes, A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>ADTPV</scope><scope>BNKNJ</scope><scope>F1S</scope></search><sort><creationdate>200809</creationdate><title>An intrusion detection system for wireless process control systems</title><author>Roosta, T. ; Nilsson, D.K. ; Lindqvist, U. ; Valdes, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c300t-fcd897bb0852dac3b16d867f491bff7af7fc0faddb4488fdee009fb4cda960453</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Intrusion detection</topic><topic>Monitoring</topic><topic>Process control</topic><topic>SCADA systems</topic><topic>Security</topic><topic>Wireless communication</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Roosta, T.</creatorcontrib><creatorcontrib>Nilsson, D.K.</creatorcontrib><creatorcontrib>Lindqvist, U.</creatorcontrib><creatorcontrib>Valdes, A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>SwePub</collection><collection>SwePub Conference</collection><collection>SWEPUB Chalmers tekniska högskola</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Roosta, T.</au><au>Nilsson, D.K.</au><au>Lindqvist, U.</au><au>Valdes, A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An intrusion detection system for wireless process control systems</atitle><btitle>2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems</btitle><stitle>MAHSS</stitle><date>2008-09</date><risdate>2008</risdate><spage>866</spage><epage>872</epage><pages>866-872</pages><issn>2155-6806</issn><eissn>2155-6814</eissn><isbn>9781424425747</isbn><isbn>1424425743</isbn><isbn>1424425751</isbn><isbn>9781424425754</isbn><eisbn>1424425751</eisbn><eisbn>9781424425754</eisbn><abstract>A recent trend in the process control system (PCS) is to deploy sensor networks in hard-to-reach areas. Using wireless sensors greatly decreases the wiring costs and increases the volume of data gathered for plant monitoring. However, ensuring the security of the deployed sensor network, which is part of the overall security of PCS, is of crucial importance. In this paper, we design a model-based intrusion detection system (IDS) for sensor networks used for PCS. Given that PCS tends to have regular traffic patterns and a well-defined request-response communication, we can design an IDS that models normal behavior of the entities and detects attacks when there is a deviation from this model. Model-based IDS can prove useful in detecting unknown attacks.</abstract><pub>IEEE</pub><doi>10.1109/MAHSS.2008.4660125</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2155-6806
ispartof 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, p.866-872
issn 2155-6806
2155-6814
language eng
recordid cdi_ieee_primary_4660125
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Intrusion detection
Monitoring
Process control
SCADA systems
Security
Wireless communication
Wireless sensor networks
title An intrusion detection system for wireless process control systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T21%3A07%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-swepub_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20intrusion%20detection%20system%20for%20wireless%20process%20control%20systems&rft.btitle=2008%205th%20IEEE%20International%20Conference%20on%20Mobile%20Ad%20Hoc%20and%20Sensor%20Systems&rft.au=Roosta,%20T.&rft.date=2008-09&rft.spage=866&rft.epage=872&rft.pages=866-872&rft.issn=2155-6806&rft.eissn=2155-6814&rft.isbn=9781424425747&rft.isbn_list=1424425743&rft.isbn_list=1424425751&rft.isbn_list=9781424425754&rft_id=info:doi/10.1109/MAHSS.2008.4660125&rft_dat=%3Cswepub_6IE%3Eoai_research_chalmers_se_131c5bda_3d40_45d1_84f7_b0026fc9ac05%3C/swepub_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424425751&rft.eisbn_list=9781424425754&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4660125&rfr_iscdi=true