Published June 17, 2019 | Version 0.1
Video/Audio Open

STOP-IT REAL-TIME ANOMALY DETECTOR (RTAD)

  • 1. Eurecat

Description

ICS were designed with automation reliability in mind and most communication technologies were proprietary with no compatibility with TCP/IP Stack. Nowadays most devices have connectivity features inheriting attacks that do not require physical access to plant or systems and organizations are dedicating resources to protect their assets converging physical, logical and IT resources. Task 5.5 objective is to detect known and unknown threats to ICS systems affecting integrated sensors or actuators and SCADA systems by monitoring and learning from its normal behaviour and giving the ICS operators the ability to detect advanced attacks and anomalies before they can cause damage or spread inside the network. Machine Learning techniques and custom attacks were developed for those purposes in order to identify attack patterns and unwanted behaviour before they can interact with sensors/actuators or spoof SCADA reporting messages for removing visibility of the threat to the operator.

Files

STOP-IT RTAD.mp4

Files (231.2 MB)

Name Size Download all
md5:7b07182258994ed92eb29ad1318b1909
231.2 MB Preview Download

Additional details

Funding

European Commission
STOP-IT - Strategic, Tactical, Operational Protection of water Infrastructure against cyber-physical Threats 740610