Publikace UTB
Repozitář publikační činnosti UTB

Evaluation of anomaly detection based on classification in relation to SCADA

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Evaluation of anomaly detection based on classification in relation to SCADA en
dc.contributor.author Vávra, Jan
dc.contributor.author Hromada, Martin
dc.relation.ispartof ICMT 2017 - 6th International Conference on Military Technologies
dc.identifier.isbn 978-1-5386-1988-9
dc.date.issued 2017
dc.citation.spage 330
dc.citation.epage 334
dc.event.title 6th International Conference on Military Technologies, ICMT 2017
dc.event.sdate 2017-05-31
dc.event.edate 2017-06-02
dc.type conferenceObject
dc.language.iso en
dc.publisher Institute of Electrical and Electronics Engineers Inc.
dc.identifier.doi 10.1109/MILTECHS.2017.7988779
dc.relation.uri http://ieeexplore.ieee.org/abstract/document/7988779/
dc.subject anomaly detection en
dc.subject cyber security en
dc.subject intrusion detection en
dc.subject supervisory control and data acquisition en
dc.description.abstract The accelerating development of information and communication technologies have an eminent influence on contemporary society. As a result, we have an opportunity to increase our effectiveness. However, there is a drawback. Contemporary systems becoming much more interconnected and opened. However, it negatively affects cyber security of Supervisory Control and Data Acquisition (SCADA) systems. Therefore, the reliable security system must be applied in order to increase system resilience. The article deals with widely used systems for intrusion detection (IDS). These systems are an indispensable basis for cyber security of every organization. The aim of the article is to evaluate an anomaly detection predictive models based on classification. © 2017 IEEE. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1007516
utb.identifier.obdid 43876934
utb.identifier.scopus 2-s2.0-85029372553
utb.source d-scopus
dc.date.accessioned 2017-10-16T14:43:41Z
dc.date.available 2017-10-16T14:43:41Z
utb.contributor.internalauthor Vávra, Jan
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Jan Vávra * , Martin Hromada † * Tomas Bata University in Zlín, Nad Stráněmi 4511, 760 05 Zlín, Czech republic, e-mail: jvavra@fai.utb.cz † Tomas Bata University in Zlín, Nad Stráněmi 4511, 760 05 Zlín, Czech republic, e-mail: hromada@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.references [1] J. Vávra and M. Hromada, “Comparison of the intrusion detection system rules in relation with the SCADA systems,” 5th Computer Science On-line Conference (CSOC 2016), vol. 465, Apr. 2016, pp. 159-169, doi: 10.1007/978-3-319-33622-0_15. [2] SCADA – Supervisory Control And Data Acquisition. Scadawiz [online]. [cit. 2016-11-14]. Available from : http://scadawiz.com/ [3] Vávra, J., and Hromada, M. (2016). Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems. In Software Engineering Perspectives and Application in Intelligent Systems (pp. 159-169). Springer International Publishing. ISSN 2194-5357. [4] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 15. Jagtap, S. B. (2013). Census data mining and data analysis using [5] WEKA. arXiv preprint arXiv:1310.4647. [6] Pan, S., Morris, T., Adhikari, U., A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System, International Journal of Network Security (IJNS), Vol.17, No.2, PP.174-188, March 2015. [7] BOUCKAERT, Remco, Eibe FRANK, Mark HALL, Richard KIRKBY, Peter REUTEMANN, Alex SEEWALD a David SCUSE. WEKA Manual for Version 3-7-13 [online]. University of Waikato, Hamilton, New Zealand, 2015 [cit. 2016-11-22]. Available from: http://www.cs.waikato.ac.nz/ml/weka/documentation.html
utb.fulltext.sponsorship This work was funded by the Internal Grant Agency (IGA/FAI/2017/003) and supported by the project ev. no. VI20152019049 "RESILIENCE 2015: Dynamic Resilience Evaluation of Interrelated Critical Infrastructure Subsystems", supported by the Ministry of the Interior of the Czech Republic in the years 2015-2019 and also supported by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. Moreover, this work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089.
utb.scopus.affiliation Tomas Bata University in Zlín, Nad Stráněmi 4511, Zlín, Czech Republic
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam