Li et al., 2016 - Google Patents
Graded security forensics readiness of SCADA systemsLi et al., 2016
View PDF- Document ID
- 6267348463716128796
- Author
- Li J
- Bajramovic E
- Gao Y
- Parekh M
- Publication year
External Links
Snippet
Security event logs are major indicators for the timely discovery of cyberattacks and during security incident examinations. Collection of sufficient logs of events associated with security incident time is critical for effective investigation. SCADA systems logging capabilities are …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kesler | The vulnerability of nuclear facilities to cyber attack; strategic insights: Spring 2010 | |
EP2572278B1 (en) | Malicious attack detection and analysis | |
CN104486346B (en) | A kind of springboard machine system | |
Choi et al. | A comparison of ICS datasets for security research based on attack paths | |
Yadav et al. | Assessment of SCADA system vulnerabilities | |
CN103326883A (en) | Uniform safety management and comprehensive audit system | |
Colbert et al. | Intrusion detection in industrial control systems | |
Li et al. | Graded security forensics readiness of SCADA systems | |
CN109005156A (en) | The shared determination method and device of account | |
Cha et al. | A blockchain-enabled IoT auditing management system complying with ISO/IEC 15408-2 | |
Ginter | Secure operations technology | |
CN109376876A (en) | A kind of highway device intelligence cruising inspection system | |
Bîrleanu et al. | Cyber security objectives and requirements for smart grid | |
CN106326769B (en) | A kind of field monitoring information processing unit | |
CN108062986B (en) | A kind of tritium carbon sampler monitoring management system | |
CN110333376A (en) | Inductance type transducer is uncapped detection method | |
Li | Detection of false data injection attacks in smart grid cyber-physical systems | |
Gao et al. | SIEM: policy-based monitoring of SCADA systems | |
Zhang | Cybersecurity solutions for industrial control systems and key equipment | |
Falk et al. | System Integrity Monitoring for Industrial Cyber Physical Systems | |
Yaddanapudi et al. | Cybersecurity Technology Roadmap: Data and Information Security for Smart Grid Industry | |
Fovino et al. | Distributed intrusion detection system for SCADA protocols | |
Zhang et al. | Research on operation mechanism, information collection and compliance model of hydropower monitoring system | |
Liu et al. | Study on Cyber Security Risk Assessment of Digital Instrumentation &Control System of Nuclear Power Plant | |
Yassin et al. | An Insider Threat Factors and Features Categorization for Manufacturing Execution System |