Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection.
Chih-Yuan LinSimin Nadjm-TehraniPublished in: RAID (2019)
Keyphrases
- anomaly detection
- network traffic
- intrusion detection
- intrusion detection system
- detect anomalies
- traffic patterns
- network intrusion detection
- detecting anomalies
- anomalous behavior
- computer security
- network anomaly detection
- network security
- detecting anomalous
- normal behavior
- control system
- behavior analysis
- traffic data
- normal traffic
- unsupervised anomaly detection
- one class support vector machines
- negative selection algorithm
- cyber security
- computer networks
- traffic flow
- malicious activities
- unsupervised learning
- malware detection
- critical infrastructure
- supervisory control
- pattern mining
- sequential patterns
- misuse detection
- connectionist systems