SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIndustrial Control Systems (ICS) often use technologies that do not support active scanning, patching, or traditional endpoint security controls. As a result, defenders must rely on compensating detective controls that minimize interference with operational assets.
This research demonstrates how passive network security monitoring can detect unauthorized devices and communications by comparing observed network traffic against documented asset inventory data. Using a custom Zeek script, a proof-of-concept detection framework enforces asset inventory expectations while analyzing live network traffic.
The results show that asset-aware network monitoring can identify anomalous behavior, including unauthorized services and access paths, and serves as a practical compensating control in environments where endpoint security and active scanning are infeasible.






