Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems

Preemptive: an integrated approach to intrusion detection and prevention in industrial control... Cyber-security of industrial control systems (ICSs) is notoriously hard due to the peculiar constraints of the specific context. At the same time, the use of specifically crafted malware to target ICSs is an established offensive mean for opposing organisations, groups, or countries. We provide an overview of the results attained by the Preemptive project to improve the cyber-security of ICSs. Preemptive devised several integrated tools for detection and prevention of intrusions in this context. It also provides a way to correlate many small events giving rise to more significant ones, and shows the whole cybersecurity state to the user by means of specific human-machine interfaces. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Critical Infrastructures Inderscience Publishers

Loading next page...
 
/lp/inderscience-publishers/preemptive-an-integrated-approach-to-intrusion-detection-and-uRDqkkWUk0
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd
ISSN
1475-3219
eISSN
1741-8038
DOI
10.1504/IJCIS.2017.088233
Publisher site
See Article on Publisher Site

Abstract

Cyber-security of industrial control systems (ICSs) is notoriously hard due to the peculiar constraints of the specific context. At the same time, the use of specifically crafted malware to target ICSs is an established offensive mean for opposing organisations, groups, or countries. We provide an overview of the results attained by the Preemptive project to improve the cyber-security of ICSs. Preemptive devised several integrated tools for detection and prevention of intrusions in this context. It also provides a way to correlate many small events giving rise to more significant ones, and shows the whole cybersecurity state to the user by means of specific human-machine interfaces.

Journal

International Journal of Critical InfrastructuresInderscience Publishers

Published: Jan 1, 2017

There are no references for this article.