Inventors at Georgia Tech have developed a security framework involving software that functions as a network monitoring and intrusion detection system, with use for ICS networks.

About

Inventors at Georgia Tech have developed a security framework involving software that functions as a network monitoring and intrusion detection system, with use for ICS networks and connected devices like programmable logic controllers (PLCs). The system monitors network traffic, parses control system specific network protocols, raises alerts, and changes to the network communication patterns. This information displays in a web-based GUI. Included in this system are methods for detecting a program change, accidentally or maliciously, using the variation of the PLCs scan cycle times. The proposed work also embodies a passive fingerprinting technique, using the control messages in the ICS networks to infer the device type or a device’s operating condition. The variations in physical characteristics will produce a unique physical response and behavior from each device, thus creating a unique fingerprint.

Key Benefits

Versatile: Has many potential applications Immediate Feedback: changes to system can be identified in real time

Applications

Power generation, transmission, and distribution Oil and gas distribution Water treatment Navy ships’ industrial control systems Army refueling centers Supervisory control and data acquisition (SCADA)

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations