International Journal of Information Security

, Volume 11, Issue 4, pp 231–251

A log mining approach for process monitoring in SCADA

  • Dina Hadžiosmanović
  • Damiano Bolzoni
  • Pieter H. Hartel
Open AccessRegular Contribution

DOI: 10.1007/s10207-012-0163-8

Cite this article as:
Hadžiosmanović, D., Bolzoni, D. & Hartel, P.H. Int. J. Inf. Secur. (2012) 11: 231. doi:10.1007/s10207-012-0163-8

Abstract

SCADA (supervisory control and data acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow.

Keywords

ICSSCADASecuritySCADA logLog analysisFrequent pattern miningProcess related threatHAZOPPHEAMELISSA
Download to read the full article text

Copyright information

© The Author(s) 2012

Authors and Affiliations

  • Dina Hadžiosmanović
    • 1
  • Damiano Bolzoni
    • 1
  • Pieter H. Hartel
    • 1
  1. 1.University of TwenteEnschedeThe Netherlands