[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2016 - Google Patents

Graded security forensics readiness of SCADA systems

Li et al., 2016

View PDF
Document ID
6267348463716128796
Author
Li J
Bajramovic E
Gao Y
Parekh M
Publication year

External Links

Snippet

Security event logs are major indicators for the timely discovery of cyberattacks and during security incident examinations. Collection of sufficient logs of events associated with security incident time is critical for effective investigation. SCADA systems logging capabilities are …
Continue reading at dl.gi.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Kesler The vulnerability of nuclear facilities to cyber attack; strategic insights: Spring 2010
EP2572278B1 (en) Malicious attack detection and analysis
CN104486346B (en) A kind of springboard machine system
Choi et al. A comparison of ICS datasets for security research based on attack paths
Yadav et al. Assessment of SCADA system vulnerabilities
CN103326883A (en) Uniform safety management and comprehensive audit system
Colbert et al. Intrusion detection in industrial control systems
Li et al. Graded security forensics readiness of SCADA systems
CN109005156A (en) The shared determination method and device of account
Cha et al. A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2
Ginter Secure operations technology
CN109376876A (en) A kind of highway device intelligence cruising inspection system
Bîrleanu et al. Cyber security objectives and requirements for smart grid
CN106326769B (en) A kind of field monitoring information processing unit
CN108062986B (en) A kind of tritium carbon sampler monitoring management system
CN110333376A (en) Inductance type transducer is uncapped detection method
Li Detection of false data injection attacks in smart grid cyber-physical systems
Gao et al. SIEM: policy-based monitoring of SCADA systems
Zhang Cybersecurity solutions for industrial control systems and key equipment
Falk et al. System Integrity Monitoring for Industrial Cyber Physical Systems
Yaddanapudi et al. Cybersecurity Technology Roadmap: Data and Information Security for Smart Grid Industry
Fovino et al. Distributed intrusion detection system for SCADA protocols
Zhang et al. Research on operation mechanism, information collection and compliance model of hydropower monitoring system
Liu et al. Study on Cyber Security Risk Assessment of Digital Instrumentation &Control System of Nuclear Power Plant
Yassin et al. An Insider Threat Factors and Features Categorization for Manufacturing Execution System