BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures.
João LimaFilipe ApolinarioNelson EscravanaCarlos RibeiroPublished in: ISSRE Workshops (2020)
Keyphrases
- business process
- intrusion detection
- cyber security
- critical infrastructure
- intrusion detection system
- cyber attacks
- business processes
- business rules
- information security
- malicious code detection
- power grids
- anomaly detection
- network security
- network traffic
- power grid
- computer networks
- web services
- telecommunication systems
- alert correlation
- data mining
- case study
- databases
- intrusion prevention
- network intrusions
- false positives and false negatives
- business process management
- machine learning
- smart grid
- risk analysis
- user interface