Loading…
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
Current intrusion detection system (IDS) technology is not suited to be widely deployed inside a supervisory, control and data acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols e...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Current intrusion detection system (IDS) technology is not suited to be widely deployed inside a supervisory, control and data acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity. |
---|---|
DOI: | 10.1109/THS.2008.4534498 |