• DocumentCode
    580249
  • Title

    MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures

  • Author

    Hadiosmanovic, D. ; Bolzoni, Damiano ; Hartel, Pieter ; Etalle, Sandro

  • Author_Institution
    Univ. of Twente, Enschede, Netherlands
  • fYear
    2011
  • fDate
    6-7 Sept. 2011
  • Firstpage
    41
  • Lastpage
    48
  • Abstract
    We address the detection of process-related threats in control systems used in critical infrastructures. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the industrial process. We use logs to detect anomalous patterns of user actions on process control application. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.
  • Keywords
    SCADA systems; authorisation; critical infrastructures; data mining; process control; ICS logs; MELISSA; automatic undesirable user action detection; critical infrastructures; industrial process control system; legitimate actions; mining event logs for intrusion in SCADA systems; process workflow; process-related threat detection; user access rights; user action anomalous pattern detection; Context; Data mining; Itemsets; Process control; Protocols; SCADA systems; Security; SCADA; critical infrastructure; industrial control system; log analysis; user behaviour;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Network Defense (EC2ND), 2011 Seventh European Conference on
  • Conference_Location
    Gothenburg
  • Print_ISBN
    978-1-4673-2116-7
  • Type

    conf

  • DOI
    10.1109/EC2ND.2011.10
  • Filename
    6377737