On SCADA control system command and response injection and intrusion detection.
Wei GaoThomas H. MorrisBradley ReavesDrew RicheyPublished in: eCrime (2010)
Keyphrases
- intrusion detection
- control system
- intrusion detection system
- cyber security
- anomaly detection
- network traffic
- network security
- network intrusion detection
- real time
- high detection rate
- critical infrastructure
- computer security
- network intrusion
- artificial immune
- data mining
- information security
- network attacks
- data mining techniques
- alert correlation
- detecting anomalous
- false positives and false negatives
- intrusion prevention
- data analysis