[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Choi et al., 2019 - Google Patents

A comparison of ICS datasets for security research based on attack paths

Choi et al., 2019

View PDF
Document ID
11823515128973238645
Author
Choi S
Yun J
Kim S
Publication year
Publication venue
Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers 13

External Links

Snippet

Industrial control systems (ICSs) are widely deployed in various domains of critical infrastructure. In recent years, security threats targeting an ICS are increasing. However, developing or verifying security technology at actual operation sites is quite difficult due to …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication

Similar Documents

Publication Publication Date Title
Choi et al. A comparison of ICS datasets for security research based on attack paths
Bhamare et al. Cybersecurity for industrial control systems: A survey
Alcaraz et al. Critical infrastructure protection: Requirements and challenges for the 21st century
Ficco et al. Simulation platform for cyber-security and vulnerability analysis of critical infrastructures
Kleinmann et al. Stealthy deception attacks against SCADA systems
Eden et al. SCADA system forensic analysis within IIoT
Eden et al. A forensic taxonomy of SCADA systems and approach to incident response
Dairi et al. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
Annor-Asante et al. Development of smart grid testbed with low-cost hardware and software for cybersecurity research and education
Fovino et al. Cyber security assessment of a power plant
Kleinmann et al. A statechart-based anomaly detection model for multi-threaded SCADA systems
Rajesh et al. Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol
Lara et al. Smart home anomaly-based IDS: Architecture proposal and case study
Waagsnes et al. Intrusion Detection System Test Framework for SCADA Systems.
Kim et al. Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems
Mavale et al. Review of cyber-attacks on smart grid system
Hahn Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation
Rodofile Generating attacks and labelling attack datasets for industrial control intrusion detection systems
Ahakonye et al. Trees Bootstrap Aggregation for Detection and Characterization of IoT-SCADA Network Traffic
Park et al. A Security System for National Network
Blazek et al. Development of cyber-physical security testbed based on IEC 61850 architecture
Li Detection of false data injection attacks in smart grid cyber-physical systems
Mesbah et al. Cyber threats and policies for industrial control systems
Marvin et al. Digital Security on Smart Grids: A Technical Review
Rashid et al. Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape