A Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation

Nai Yu Chen, Pei Wen Chou, Jung Shian Li, I-Hsien Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Deploying intrusion detection systems is a common cybersecurity measure, and intrusion detection systems typically operate at the ports of gateways. In critical infrastructure, industrial control systems often employ network isolation strategies, lacking the role of gateways. This research primarily explores the deployment of the Snort intrusion detection system in such an environment, combined with specific OT rules. Validation is conducted using the cybersecurity testbed of the dam control system established by TWISC@NCKU in Taiwan. The results indicate that by employing our proposed approach, it is possible to effectively detect abnormal network traffic, addressing the common issue of inadequate monitoring in environments with network isolation.

Original languageEnglish
Title of host publicationProceedings of The 2024 International Conference on Artificial Life and Robotics, ICAROB 2024
EditorsYingmin Jia, Takao Ito, Ju-Jang Lee
PublisherALife Robotics Corporation Ltd
Pages30-33
Number of pages4
ISBN (Print)9784991333705
Publication statusPublished - 2024
Event29th International Conference on Artificial Life and Robotics, ICAROB 2024 - Oita, Japan
Duration: 2024 Feb 222024 Feb 25

Publication series

NameProceedings of International Conference on Artificial Life and Robotics
ISSN (Electronic)2435-9157

Conference

Conference29th International Conference on Artificial Life and Robotics, ICAROB 2024
Country/TerritoryJapan
CityOita
Period24-02-2224-02-25

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'A Case Study of Network-Based Intrusion Detection System Deployment in Industrial Control Systems with Network Isolation'. Together they form a unique fingerprint.

Cite this