-
1
-
-
70350634504
-
Using model-based intrusion detection for SCADA networks
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for SCADA networks," in Proceedings of the SCADA Security Scientific Symposium, Miami Beach, Florida, Jan. 2007.
-
Proceedings of the SCADA Security Scientific Symposium, Miami Beach, Florida, Jan. 2007
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
2
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Springer
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Recent Advances in Intrusion Detection (RAID). Springer, 2004, pp. 258-277.
-
(2004)
Recent Advances in Intrusion Detection (RAID)
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
5
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proceedings of LISA '99: 13th Systems Administration Conference, Seattle, Washington, Nov. 7-12, 1999, pp. 229-238.
-
Proceedings of LISA '99: 13th Systems Administration Conference, Seattle, Washington, Nov. 7-12, 1999
, pp. 229-238
-
-
Roesch, M.1
-
6
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
Recent Advances in Intrusion Detection (RAID 2000), ser. H. Debar, L. Me, and F. Wu, Eds., Toulouse, France, Oct.
-
A. Valdes and K. Skinner, "Adaptive, model-based monitoring for cyber attack detection," in Recent Advances in Intrusion Detection (RAID 2000), ser. LNCS, H. Debar, L. Me, and F. Wu, Eds., Toulouse, France, Oct. 2000.
-
(2000)
LNCS
-
-
Valdes, A.1
Skinner, K.2
-
8
-
-
84940110274
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
U. Lindqvist and P. A. Porras, "Detecting computer and network misuse through the production-based expert system toolset (P-BEST)," in Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 9-12, 1999, pp. 146-161.
-
Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 9-12, 1999
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
9
-
-
78549254659
-
-
last accessed March 25, 2010. [Online]. Available
-
"Symantec Endpoint Protection System," last accessed March 25, 2010. [Online]. Available: http://www.symantec.com/business/endpoint-protection
-
Symantec Endpoint Protection System
-
-
-
10
-
-
78549260827
-
-
last accessed March 30, 2010. [Online]. Available
-
"McAfee Antivirus Enterprise," last accessed March 30, 2010. [Online]. Available: http://www.mcafee.com/us/enterprise/products/system- security/servers/virusscan-enterprise.html
-
McAfee Antivirus Enterprise
-
-
-
11
-
-
68949113618
-
-
last accessed April 20, 2010. [Online]. Available
-
Digital Bond, "IDS signatures," last accessed April 20, 2010. [Online]. Available: http://www.digitalbond.com/index.php/research/scada-idsips/ ids-signatures/
-
IDS Signatures
-
-
-
12
-
-
70449653118
-
Communication pattern anomaly detection in process control systems
-
A. Valdes and S. Cheung, "Communication pattern anomaly detection in process control systems," in 2009 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 11-12, 2009.
-
2009 IEEE International Conference on Technologies for Homeland Security, Waltham, MA, May 11-12, 2009
-
-
Valdes, A.1
Cheung, S.2
-
13
-
-
84958955499
-
A mission-impact-based approach to INFOSEC alarm correlation
-
[Online]. Available
-
P. Porras, M. Fong, and A. Valdes, "A mission-impact-based approach to INFOSEC alarm correlation," in Proceedings of Recent Advances in Intrusion Detection, October 2002, pp. 95-114. [Online]. Available: http://www.csl.sri.com/papers/mcorrelator/
-
Proceedings of Recent Advances in Intrusion Detection, October 2002
, pp. 95-114
-
-
Porras, P.1
Fong, M.2
Valdes, A.3
-
14
-
-
78549236294
-
-
last accessed March 23, 2010. [Online]. Available
-
"Invensys process systems," last accessed March 23, 2010. [Online]. Available: http://www.ips.invensys.com/en/products/autocontrols/Pages/ DistributedControl-IASeries-P018.aspx
-
Invensys Process Systems
-
-
-
15
-
-
78549281881
-
-
Sandia National Laboratories, Tech. Rep. Sandia Report SAND2010-0568, Feb.
-
M. McDonald, J. Mulder, B. Richardson, R. Cassidy, A. Chavez, N. Pattengale, G. Pollock, J. Urrea, M. Schwartz, W. Atkins, and R. Halbgewachs, "Modeling and Simulation for Cyber-physical System Security Research, Development and Applications," Sandia National Laboratories, Tech. Rep. Sandia Report SAND2010-0568, Feb. 2010.
-
(2010)
Modeling and Simulation for Cyber-physical System Security Research, Development and Applications
-
-
McDonald, M.1
Mulder, J.2
Richardson, B.3
Cassidy, R.4
Chavez, A.5
Pattengale, N.6
Pollock, G.7
Urrea, J.8
Schwartz, M.9
Atkins, W.10
Halbgewachs, R.11
-
16
-
-
78549296854
-
-
last accessed April 21, [Online]. Available
-
"ICCP," last accessed April 21, 2010. [Online]. Available: http://intelligrid.ipower.com/IntelliGrid-Architecture/NewTechnologies/ Tech-IEC-60870-6-%28ICCP%29.htm
-
(2010)
ICCP
-
-
-
17
-
-
78549262204
-
-
last accessed April 21, 2010. [Online]. Available
-
"DATES demo at DistribuTech 2010," last accessed April 21, 2010. [Online]. Available: http://www.csl.sri.com/projects/dates/distributech. html
-
DATES Demo at DistribuTech 2010
-
-
-
19
-
-
84864173616
-
-
Sandia National Laboratories, Tech. Rep.
-
J. Stamp, M. Berg, and M. Baca, "Reference Model for Control and Automation Systems in Electrical Power," Sandia National Laboratories, Tech. Rep., 2005.
-
(2005)
Reference Model for Control and Automation Systems in Electrical Power
-
-
Stamp, J.1
Berg, M.2
Baca, M.3
-
21
-
-
78549234830
-
-
last accessed April 20, 2010. [Online]. Available
-
"Tofino," last accessed April 20, 2010. [Online]. Available: http://www.tofinosecurity.com/products/Tofino-Firewall-LSM
-
Tofino
-
-
-
22
-
-
78549242445
-
-
last accessed April 20, 2010. [Online]. Available
-
"Industrial defender," last accessed April 20, 2010. [Online]. Available: http://www.industrialdefender.com/
-
Industrial Defender
-
-
|