Kontaktujte nás | Jazyk: čeština English
dc.title | Evaluation of anomaly detection based on classification in relation to SCADA | en |
dc.contributor.author | Vávra, Jan | |
dc.contributor.author | Hromada, Martin | |
dc.relation.ispartof | ICMT 2017 - 6th International Conference on Military Technologies | |
dc.identifier.isbn | 978-1-5386-1988-9 | |
dc.date.issued | 2017 | |
dc.citation.spage | 330 | |
dc.citation.epage | 334 | |
dc.event.title | 6th International Conference on Military Technologies, ICMT 2017 | |
dc.event.sdate | 2017-05-31 | |
dc.event.edate | 2017-06-02 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/MILTECHS.2017.7988779 | |
dc.relation.uri | http://ieeexplore.ieee.org/abstract/document/7988779/ | |
dc.subject | anomaly detection | en |
dc.subject | cyber security | en |
dc.subject | intrusion detection | en |
dc.subject | supervisory control and data acquisition | en |
dc.description.abstract | The accelerating development of information and communication technologies have an eminent influence on contemporary society. As a result, we have an opportunity to increase our effectiveness. However, there is a drawback. Contemporary systems becoming much more interconnected and opened. However, it negatively affects cyber security of Supervisory Control and Data Acquisition (SCADA) systems. Therefore, the reliable security system must be applied in order to increase system resilience. The article deals with widely used systems for intrusion detection (IDS). These systems are an indispensable basis for cyber security of every organization. The aim of the article is to evaluate an anomaly detection predictive models based on classification. © 2017 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1007516 | |
utb.identifier.obdid | 43876934 | |
utb.identifier.scopus | 2-s2.0-85029372553 | |
utb.source | d-scopus | |
dc.date.accessioned | 2017-10-16T14:43:41Z | |
dc.date.available | 2017-10-16T14:43:41Z | |
utb.contributor.internalauthor | Vávra, Jan | |
utb.contributor.internalauthor | Hromada, Martin | |
utb.fulltext.affiliation | Jan Vávra * , Martin Hromada † * Tomas Bata University in Zlín, Nad Stráněmi 4511, 760 05 Zlín, Czech republic, e-mail: [email protected] † Tomas Bata University in Zlín, Nad Stráněmi 4511, 760 05 Zlín, Czech republic, e-mail: [email protected] | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] J. Vávra and M. Hromada, “Comparison of the intrusion detection system rules in relation with the SCADA systems,” 5th Computer Science On-line Conference (CSOC 2016), vol. 465, Apr. 2016, pp. 159-169, doi: 10.1007/978-3-319-33622-0_15. [2] SCADA – Supervisory Control And Data Acquisition. Scadawiz [online]. [cit. 2016-11-14]. Available from : http://scadawiz.com/ [3] Vávra, J., and Hromada, M. (2016). Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems. In Software Engineering Perspectives and Application in Intelligent Systems (pp. 159-169). Springer International Publishing. ISSN 2194-5357. [4] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 15. Jagtap, S. B. (2013). Census data mining and data analysis using [5] WEKA. arXiv preprint arXiv:1310.4647. [6] Pan, S., Morris, T., Adhikari, U., A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System, International Journal of Network Security (IJNS), Vol.17, No.2, PP.174-188, March 2015. [7] BOUCKAERT, Remco, Eibe FRANK, Mark HALL, Richard KIRKBY, Peter REUTEMANN, Alex SEEWALD a David SCUSE. WEKA Manual for Version 3-7-13 [online]. University of Waikato, Hamilton, New Zealand, 2015 [cit. 2016-11-22]. Available from: http://www.cs.waikato.ac.nz/ml/weka/documentation.html | |
utb.fulltext.sponsorship | This work was funded by the Internal Grant Agency (IGA/FAI/2017/003) and supported by the project ev. no. VI20152019049 "RESILIENCE 2015: Dynamic Resilience Evaluation of Interrelated Critical Infrastructure Subsystems", supported by the Ministry of the Interior of the Czech Republic in the years 2015-2019 and also supported by the research project VI20172019054 "An analytical software module for the real-time resilience evaluation from point of the converged security ", supported by the Ministry of the Interior of the Czech Republic in the years 2017-2019. Moreover, this work was supported by the Ministry of Education, Youth and Sports of the Czech Republic within the National Sustainability Programme project No. LO1303 (MSMT-7778/2014) and also by the European Regional Development Fund under the project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089. | |
utb.scopus.affiliation | Tomas Bata University in Zlín, Nad Stráněmi 4511, Zlín, Czech Republic |