dc.rights.license | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.contributor.author | Iturbe, Mikel | |
dc.contributor.author | Garitano, Iñaki | |
dc.contributor.author | Zurutuza, Urko | |
dc.contributor.author | Uribeetxeberria, Roberto | |
dc.date.accessioned | 2022-10-31T10:38:40Z | |
dc.date.available | 2022-10-31T10:38:40Z | |
dc.date.issued | 2016 | |
dc.identifier.isbn | 9789897581755 | en |
dc.identifier.other | https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=122681 | en |
dc.identifier.uri | https://hdl.handle.net/20.500.11984/5789 | |
dc.description.abstract | Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities of these networks disallow the usage of traditional IT security mechanisms, while allowing other security strategies not suitable for IT networks. As industrial network traffic flows follow constant and repetitive patterns, whitelisting has been proved a viable approach for anomaly detection in industrial networks. In this paper, we present a network flow and related alert visualization system based on chord diagrams. The system represents the detected network flows within a time interval, highlighting the ones that do not comply the whitelisting rules. Moreover, it also depicts the network flows that, even if they are registered in the whitelist, have not been detected on the selected time interval (e.g. a host is down). Finally, the visualization system is tested w ith network data coming from a real industrial network. | en |
dc.language.iso | eng | en |
dc.publisher | SCITEPRESS | en |
dc.rights | © 2016 SCITEPRESS | en |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Industrial Networks | en |
dc.subject | Security Visualization | en |
dc.subject | Chord Diagrams | en |
dc.subject | Flow Monitoring | en |
dc.title | Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting | en |
dcterms.accessRights | http://purl.org/coar/access_right/c_abf2 | en |
dcterms.source | Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016) | en |
local.contributor.group | Análisis de datos y ciberseguridad | es |
local.description.peerreviewed | true | en |
local.description.publicationfirstpage | 99 | en |
local.description.publicationlastpage | 106 | en |
local.identifier.doi | http://doi.org/10.5220/0005670000990106 | en |
local.source.details | Volume 2: IVAPP. Pp. 99-106. SCITEPRESS, Science and Technology Publications, 2016 | en |
oaire.format.mimetype | application/pdf | |
oaire.file | $DSPACE\assetstore | |
oaire.resourceType | http://purl.org/coar/resource_type/c_c94f | en |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | en |