SCADA security: machine learning concepts for intrusion detection and prevention : SCADA-based IDs security
"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors d...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ, USA
Wiley
2021
|
Schriftenreihe: | Wiley series on parallel and distributed computing
|
Online-Zugang: | TUM01 TUM01 |
Zusammenfassung: | "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--.. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource Illustrationen |
ISBN: | 9781119606383 1119606381 9781119606352 1119606357 9781119606079 1119606071 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV047246028 | ||
003 | DE-604 | ||
005 | 20240222 | ||
007 | cr|uuu---uuuuu | ||
008 | 210420s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781119606383 |9 978-1-119-60638-3 | ||
020 | |a 1119606381 |9 1119606381 | ||
020 | |a 9781119606352 |c EPUB |9 978-1-119-60635-2 | ||
020 | |a 1119606357 |9 1119606357 | ||
020 | |a 9781119606079 |c PDF |9 978-1-119-60607-9 | ||
020 | |a 1119606071 |9 1119606071 | ||
035 | |a (OCoLC)1249661231 | ||
035 | |a (DE-599)HEB476217091 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-91 | ||
084 | |a DAT 460 |2 stub | ||
084 | |a MSR 600 |2 stub | ||
084 | |a DAT 708 |2 stub | ||
084 | |a DAT 461 |2 stub | ||
084 | |a MSR 500 |2 stub | ||
100 | 1 | |a Almalawi, Abdulmohsen |e Verfasser |4 aut | |
245 | 1 | 0 | |a SCADA security |b machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |c Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology) |
264 | 1 | |a Hoboken, NJ, USA |b Wiley |c 2021 | |
300 | |a 1 Online-Ressource |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Wiley series on parallel and distributed computing | |
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--.. | |
700 | 1 | |a Tari, Zahir |d 1961- |e Verfasser |0 (DE-588)1197562176 |4 aut | |
700 | 1 | |a Fahad, Adil |e Verfasser |4 aut | |
700 | 1 | |a Yi, Xun |e Verfasser |0 (DE-588)1186276703 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-119-60603-1 |
912 | |a ZDB-35-WIC |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032650194 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6424081 |l TUM01 |p ZDB-30-PQE |q TUM_PDA_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383 |l TUM01 |p ZDB-35-WIC |q TUM_Einzelkauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182386502533120 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Almalawi, Abdulmohsen Tari, Zahir 1961- Fahad, Adil Yi, Xun |
author_GND | (DE-588)1197562176 (DE-588)1186276703 |
author_facet | Almalawi, Abdulmohsen Tari, Zahir 1961- Fahad, Adil Yi, Xun |
author_role | aut aut aut aut |
author_sort | Almalawi, Abdulmohsen |
author_variant | a a aa z t zt a f af x y xy |
building | Verbundindex |
bvnumber | BV047246028 |
classification_tum | DAT 460 MSR 600 DAT 708 DAT 461 MSR 500 |
collection | ZDB-35-WIC ZDB-30-PQE |
ctrlnum | (OCoLC)1249661231 (DE-599)HEB476217091 |
discipline | Informatik Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik |
discipline_str_mv | Informatik Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02999nmm a22004931c 4500</leader><controlfield tag="001">BV047246028</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240222 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210420s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119606383</subfield><subfield code="9">978-1-119-60638-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119606381</subfield><subfield code="9">1119606381</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119606352</subfield><subfield code="c">EPUB</subfield><subfield code="9">978-1-119-60635-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119606357</subfield><subfield code="9">1119606357</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119606079</subfield><subfield code="c">PDF</subfield><subfield code="9">978-1-119-60607-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119606071</subfield><subfield code="9">1119606071</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249661231</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HEB476217091</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-91</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MSR 600</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 708</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MSR 500</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Almalawi, Abdulmohsen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SCADA security</subfield><subfield code="b">machine learning concepts for intrusion detection and prevention : SCADA-based IDs security</subfield><subfield code="c">Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ, USA</subfield><subfield code="b">Wiley</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley series on parallel and distributed computing</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--..</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tari, Zahir</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1197562176</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fahad, Adil</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yi, Xun</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1186276703</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-119-60603-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032650194</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=6424081</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">TUM_PDA_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047246028 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:06:24Z |
indexdate | 2024-07-10T09:06:44Z |
institution | BVB |
isbn | 9781119606383 1119606381 9781119606352 1119606357 9781119606079 1119606071 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032650194 |
oclc_num | 1249661231 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-91 DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM DE-91 DE-BY-TUM |
physical | 1 Online-Ressource Illustrationen |
psigel | ZDB-35-WIC ZDB-30-PQE ZDB-30-PQE TUM_PDA_PQE_Kauf ZDB-35-WIC TUM_Einzelkauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Wiley |
record_format | marc |
series2 | Wiley series on parallel and distributed computing |
spelling | Almalawi, Abdulmohsen Verfasser aut SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology) Hoboken, NJ, USA Wiley 2021 1 Online-Ressource Illustrationen txt rdacontent c rdamedia cr rdacarrier Wiley series on parallel and distributed computing Includes bibliographical references and index "This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems, their architectures, and main components. In Chapter 3, the authors describe SCADAVT, a framework for a SCADA security testbed based on virtualization technology. Chapter 4 introduces an approach called kNNVWC to find the k-nearest neighbours in large and high dimensional data. Chapter 5 describes an approach called SDAD to extract proximity-based detection rules, from unlabelled SCADA data, based on a clustering-based technique. In Chapter 6, the authors explore an approach called GATUD which finds a global and efficient anomaly threshold. The book concludes with a summary of the contributions made by this book to the extant body of research, and suggests possible directions for future research"--.. Tari, Zahir 1961- Verfasser (DE-588)1197562176 aut Fahad, Adil Verfasser aut Yi, Xun Verfasser (DE-588)1186276703 aut Erscheint auch als Druck-Ausgabe, Hardcover 978-1-119-60603-1 |
spellingShingle | Almalawi, Abdulmohsen Tari, Zahir 1961- Fahad, Adil Yi, Xun SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
title | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
title_auth | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
title_exact_search | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
title_exact_search_txtP | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
title_full | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology) |
title_fullStr | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology) |
title_full_unstemmed | SCADA security machine learning concepts for intrusion detection and prevention : SCADA-based IDs security Abdulmohsen Almalawi (King Abdulaziz University), Zahir Tari (RMIT University), Adil Fahad (Al Baha University), Xun Yi (Royal Melbourne Institute of Technology) |
title_short | SCADA security |
title_sort | scada security machine learning concepts for intrusion detection and prevention scada based ids security |
title_sub | machine learning concepts for intrusion detection and prevention : SCADA-based IDs security |
work_keys_str_mv | AT almalawiabdulmohsen scadasecuritymachinelearningconceptsforintrusiondetectionandpreventionscadabasedidssecurity AT tarizahir scadasecuritymachinelearningconceptsforintrusiondetectionandpreventionscadabasedidssecurity AT fahadadil scadasecuritymachinelearningconceptsforintrusiondetectionandpreventionscadabasedidssecurity AT yixun scadasecuritymachinelearningconceptsforintrusiondetectionandpreventionscadabasedidssecurity |