Vis enkel innførsel

dc.contributor.authorWaagsnes, Henrik
dc.date.accessioned2017-09-18T07:33:40Z
dc.date.available2017-09-18T07:33:40Z
dc.date.issued2017
dc.identifier.urihttp://hdl.handle.net/11250/2455016
dc.descriptionMaster's thesis Information- and communication technology IKT590 - University of Agder 2017nb_NO
dc.description.abstractSupervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This master thesis presents a SCADA Intrusion Detection System Test Framework that can be used to simulate SCADA traffic and detect malicious network activity. The framework uses a signature-based approach and utilize two different IDS engines, Suricata and Snort. The IDS engines include rule-sets for the IEC 60870-5-104, DNP3 and Modbus protocols. The IDS engines ships detected events to a distributed cluster and visualize them using a web interface. The experiments carried out in this project show that there generally is little difference between Suricata and Snort's ability to detect malicious traffic. Suricata is compatible with signatures written in snort lightweight rules description language. I did however, discover some compatibility issues. The purposed framework applies additional latency to the analysis of IDS events. The perceived latency was generally higher for Snort events than for Suricata events. The reason for this is probably the additional processing time applied by the implemented log conversion tool. Keywords: SCADA, IDS, SIEMnb_NO
dc.language.isoengnb_NO
dc.publisherUniversitetet i Agder ; University of Agdernb_NO
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.subjectIKT590nb_NO
dc.subjectSCADAnb_NO
dc.subjectIDSnb_NO
dc.subjectSIEMnb_NO
dc.titleSCADA Intrusion Detection System Test Frameworknb_NO
dc.typeMaster thesisnb_NO
dc.subject.nsiVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424nb_NO
dc.source.issue[Flere pag.]nb_NO


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal