12: Exception, Anomaly, and Threat Detection

Abstract

In addition to point cybersecurity defenses, behavioral- and anomaly-based threat detection is possible. Learn how to use your knowledge of the process control system and established behavioral baselines to identify potential threats.

Keywords

Advanced threat detection; Anomaly detection; Baseline; Behavior; Correlation; Exception reporting; XDR
Information in this chapter
• Exception Reporting
• Behavioral Anomaly Detection
• Behavioral Whitelisting
• Advanced Threat Detection

Clear policies about what communications are allowed and what are not have already been obtained by defining zones. The operation within each zone should also be well defined and relatively ...

Get Industrial Network Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.