Contact Us | Language: čeština English
Title: | Comparison of the intrusion detection system rules in relation with the SCADA systems |
Author: | Vávra, Jan; Hromada, Martin |
Document type: | Conference paper (English) |
Source document: | Advances in Intelligent Systems and Computing. 2016, vol. 465, p. 159-169 |
ISSN: | 2194-5357 (Sherpa/RoMEO, JCR) |
ISBN: | 978-3-319-33620-6 |
DOI: | https://doi.org/10.1007/978-3-319-33622-0_15 |
Abstract: | Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules. © Springer International Publishing Switzerland 2016. |
Full text: | https://link.springer.com/chapter/10.1007/978-3-319-33622-0_15 |
Physical copies: | Copies in TBU Library catalogue |
Show full item record |