Abstract
The aim of this paper is to conduct a performance comparative analysis of open-source HIPS (Host Intrusion Prevention System) solutions in order to improve security measures in power systems. First, the HIPS technology is introduced with an emphasis on its use for increasing security within power systems. Secondly, selected HIPS solutions are introduced in order to conduct the comparative analysis. Finally, the results of the comparative analysis of the individual solutions are presented with an emphasis on the use of system resources in the deployment of HIPS solutions on Windows workstations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baykara, M., Das, R.: A novel honeypot based security approach for real-time intrusion detection and prevention systems. J. Inf. Secur. Appl. (2018). https://doi.org/10.1016/j.jisa.2018.06.004.ISSN22142126
Vargas Martinez, C., Vogel-Heuser, B.: A host intrusion detection system architecture for embedded industrial devices. J. Franklin Inst. (2019). https://doi.org/10.1016/j.jfranklin.2019.03.037.ISSN00160032
Lee, R., Assante M. J., Conway, T.: Analysis of the cyber attack on the Ukrainian power Grid. NERC (2016). https://www.nerc.com/pa/ci/esisac/documents/e-isac_sans_ukraine_duc_18mar2016.pdf
Passeri, P.: 2016 Cyber Attacks Statistics. Hackmageddon (2017). https://www.hackmageddon.com/2017/01/19/2016-cyber-attacks-statistics/
Ponemon institute: 2016 Cost of Cyber Crime Study & the Risk of Business Innovation. Ponemon Institute LLC (2016). https://go.cyphort.com/Ponemon-SIEM-Report-2017-Page.html
Birkinshaw, C, Rouka, E., Vassilakis, V.G.: Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks (2019). https://doi.org/10.1016/j.jnca.2019.03.005, ISBN 1084-8045
Cook, A., Janicke, H., Smith, R., Maglaras, L.: The industrial control system cyber defence triage process. Comput. Secur. (2017). https://doi.org/10.1016/j.cose.2017.07.009, ISSN 01674048.
Radvanovsky, R., Brodsky, J.: Handbook of SCADA/Control Systems Security, 2nd ed. CRC Press, Taylor & Francis Group, Boca Raton (2016). ISBN 9781498717076.
Gregory-Brown, B.: Securing industrial control systems - 2017: A sans survey (2017). https://www.sans.org/reading-room/whitepapers/ICS/paper/3786.
Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., Júnior J. C., Katsikas, S.: A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems (2017). https://doi.org/10.1016/j.cose.2016.07.002, ISSN 01674048.
Sawant, A.: A comparative study of different intrusion prevention systems. In: Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) (2018). https://doi.org/10.1109/ICCUBEA.2018.8697500, ISBN 978-1-5386-5257-2, Dostupné z: https://ieeexplore.ieee.org/document/8697500/
Anilbhai, S. P., Parekh, C.: Intrusion detection and prevention system for IoT. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 2(6) (2017)
Acknowledgment
This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. We would like to thank Mrs. H. Svecova, a doctoral student, for the practical verification of the proposed solutions and close cooperation in the solution.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Svoboda, T., Horalek, J., Sobeslav, V. (2021). Analysis of a HIPS Solution Use in Power Systems. In: Vinh, P.C., Rakib, A. (eds) Context-Aware Systems and Applications, and Nature of Computation and Communication. ICCASA ICTCC 2020 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 343. Springer, Cham. https://doi.org/10.1007/978-3-030-67101-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-67101-3_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67100-6
Online ISBN: 978-3-030-67101-3
eBook Packages: Computer ScienceComputer Science (R0)