TBU Publications
Repository of TBU Publications

Comparison of the intrusion detection system rules in relation with the SCADA systems

DSpace Repository

Show simple item record

dc.title Comparison of the intrusion detection system rules in relation with the SCADA systems en
dc.contributor.author Vávra, Jan
dc.contributor.author Hromada, Martin
dc.relation.ispartof Advances in Intelligent Systems and Computing
dc.identifier.issn 2194-5357 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-3-319-33620-6
dc.identifier.isbn 978-3-319-33622-0
dc.date.issued 2016
utb.relation.volume 465
dc.citation.spage 159
dc.citation.epage 169
dc.event.title 5th Computer Science On-line Conference, CSOC 2016
dc.event.location Prague
utb.event.state-en Czech Republic
utb.event.state-cs Česká republika
dc.event.sdate 2015-04-27
dc.event.edate 2015-04-30
dc.type conferenceObject
dc.language.iso en
dc.publisher Springer Verlag
dc.identifier.doi 10.1007/978-3-319-33622-0_15
dc.relation.uri https://link.springer.com/chapter/10.1007/978-3-319-33622-0_15
dc.subject Cyber security en
dc.subject Industrial control system en
dc.subject Intrusion detection system en
dc.subject Signature en
dc.description.abstract Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules. © Springer International Publishing Switzerland 2016. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1006435
utb.identifier.obdid 43875723
utb.identifier.scopus 2-s2.0-84964792002
utb.identifier.wok 000385788200015
utb.source d-scopus
dc.date.accessioned 2016-07-26T14:58:31Z
dc.date.available 2016-07-26T14:58:31Z
dc.rights.access openAccess
utb.identifier.utb-sysno 87686
utb.contributor.internalauthor Vávra, Jan
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.affiliation Jan Vávra and Martin Hromada J. Vávra ( ✉ ) ⋅ M. Hromada Tomas Bata University in Zlin, Zlin, Czech Republic e-mail: jvavra@fai.utb.cz M. Hromada e-mail: hromada@fai.utb.cz
utb.fulltext.dates -
utb.fulltext.sponsorship This work was founded by the Internal Grant Agency (IGA/FAI/2016/014) and supported by the project ev. no. VI20152019049 “RESILIENCE 2015:RESILIENCE 2015: Dynamic Resilience Evaluation of Interrelated Critical Infrastructure Subsystems” supported by the Ministry of the Interior Security Research Programme of the Czech Republic in the years 2015–2020. Moreover, this work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089.
Find Full text

Files in this item

Show simple item record