Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks.
Ömer SenTarek HassanAndreas UlbigMartin HenzePublished in: CoRR (2024)
Keyphrases
- intrusion detection system
- intrusion detection
- cyber security
- network security
- security measures
- computer security
- cyber attacks
- anomaly detection
- computer networks
- network intrusion detection
- network traffic
- intrusion prevention
- critical infrastructure
- security policies
- denial of service attacks
- information security
- distributed intrusion detection
- unauthorized access
- security management
- attack scenarios
- data mining techniques
- alert correlation
- key management
- data mining
- access control
- attack detection
- security issues
- computer systems
- network attacks
- control system
- query processing