Whitelist-Based Anomaly Detection for Industrial Control System Security 


Vol. 38,  No. 8, pp. 641-653, Aug.  2013


PDF
  Abstract

Recent cyber attacks targeting control systems are getting sophisticated and intelligent notoriously. As the existing signature based detection techniques faced with their limitations, a whitelist model with security techniques is getting attention again. However, techniques that are being developed in a whitelist model used at the application level narrowly and cannot provide specific information about anomalism of various cases. In this paper, we classify abnormal cases that can occur in control systems of enterprises and propose a new whitelist model for detecting abnormal cases.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. Yoo, J. Yun, T. Shon, "Whitelist-Based Anomaly Detection for Industrial Control System Security," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 641-653, 2013. DOI: .

[ACM Style]

Hyunguk Yoo, Jeong-Han Yun, and Taeshik Shon. 2013. Whitelist-Based Anomaly Detection for Industrial Control System Security. The Journal of Korean Institute of Communications and Information Sciences, 38, 8, (2013), 641-653. DOI: .

[KICS Style]

Hyunguk Yoo, Jeong-Han Yun, Taeshik Shon, "Whitelist-Based Anomaly Detection for Industrial Control System Security," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 8, pp. 641-653, 8. 2013.