dc.contributor.advisor | Λαμπρινουδάκης, Κωνσταντίνος | |
dc.contributor.advisor | Alcaraz, Christina | |
dc.contributor.author | Καπογιάννη, Ειρήνη | |
dc.date.accessioned | 2018-11-27T11:34:25Z | |
dc.date.available | 2018-11-27T11:34:25Z | |
dc.date.issued | 2018 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/11673 | |
dc.format.extent | 80 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές | * |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.title | Anomaly detection for industrial control systems | el |
dc.type | Master Thesis | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτων | el |
dc.description.abstractEN | As Industrial Control Systems (ICSs) become more and more connected it follows that they need to
become more secure. Traditional Intrusion Detection Systems (IDSs) do not work well due to the fact
that they mostly work on a signature basis and there are not many known signatures to detect attacks
on ICSs. Since the network traffic from an ICS is claimed to be static and signatures are scarce, searching
for anomalies in the network to detect threats is more effective. This can be achieved using machine
learning and other statistical models, teaching the system to tell regular traffic from irregularities. In
this thesis we survey different anomaly detection techniques, which based on different parameters, we
evaluate and point the one that can fit better. Based on the survey and the risk analysis we analyze the
algorithm on which we conclude, and with real-time data-sets (normal and anomalous) we do an
implementation. From this work we propose and evaluate methods to be used when creating a more
data driven IDS, capable of detecting process semantic tampering within an ICS. Our results from
conducted experiments exhibit a static nature of the data originating from the ICS and the result from
evaluating many different proposed anomaly detections using proof of concept systems, we deem that
the anomaly detection and algorithm that we conclude works well for both semantic tampering as well
as on a network basis. Having an IDS using a fusion this proposed method, would benefit the security of
an ICS. | el |
dc.corporate.name | Centro de Investigación Ada Byron | el |
dc.contributor.master | Ασφάλεια Ψηφιακών Συστημάτων | el |
dc.subject.keyword | Anomaly detection | el |
dc.subject.keyword | Machine learning | el |
dc.subject.keyword | Industrial control systems | el |
dc.subject.keyword | Machine learning algorithms | el |
dc.date.defense | 2018-08-31 | |