Choi et al., 2019 - Google Patents
A comparison of ICS datasets for security research based on attack pathsChoi et al., 2019
View PDF- Document ID
- 11823515128973238645
- Author
- Choi S
- Yun J
- Kim S
- Publication year
- Publication venue
- Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers 13
External Links
Snippet
Industrial control systems (ICSs) are widely deployed in various domains of critical infrastructure. In recent years, security threats targeting an ICS are increasing. However, developing or verifying security technology at actual operation sites is quite difficult due to …
- 238000011160 research 0 title abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Choi et al. | A comparison of ICS datasets for security research based on attack paths | |
Bhamare et al. | Cybersecurity for industrial control systems: A survey | |
Alcaraz et al. | Critical infrastructure protection: Requirements and challenges for the 21st century | |
Ficco et al. | Simulation platform for cyber-security and vulnerability analysis of critical infrastructures | |
Kleinmann et al. | Stealthy deception attacks against SCADA systems | |
Eden et al. | SCADA system forensic analysis within IIoT | |
Eden et al. | A forensic taxonomy of SCADA systems and approach to incident response | |
Dairi et al. | Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids | |
Annor-Asante et al. | Development of smart grid testbed with low-cost hardware and software for cybersecurity research and education | |
Fovino et al. | Cyber security assessment of a power plant | |
Kleinmann et al. | A statechart-based anomaly detection model for multi-threaded SCADA systems | |
Rajesh et al. | Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol | |
Lara et al. | Smart home anomaly-based IDS: Architecture proposal and case study | |
Waagsnes et al. | Intrusion Detection System Test Framework for SCADA Systems. | |
Kim et al. | Unknown payload anomaly detection based on format and field semantics inference in cyber-physical infrastructure systems | |
Mavale et al. | Review of cyber-attacks on smart grid system | |
Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation | |
Rodofile | Generating attacks and labelling attack datasets for industrial control intrusion detection systems | |
Ahakonye et al. | Trees Bootstrap Aggregation for Detection and Characterization of IoT-SCADA Network Traffic | |
Park et al. | A Security System for National Network | |
Blazek et al. | Development of cyber-physical security testbed based on IEC 61850 architecture | |
Li | Detection of false data injection attacks in smart grid cyber-physical systems | |
Mesbah et al. | Cyber threats and policies for industrial control systems | |
Marvin et al. | Digital Security on Smart Grids: A Technical Review | |
Rashid et al. | Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape |