메뉴 건너뛰기




Volumn 7, Issue 2, 2011, Pages 179-186

A multidimensional critical state analysis for detecting intrusions in SCADA systems

Author keywords

Critical states; intrusion detection; supervisory control and data acquisition (SCADA) systems

Indexed keywords

CLASSIC MODELS; CRITICAL STATE; DETECTION APPROACH; INDUSTRIAL INSTALLATIONS; INFORMATION AND COMMUNICATIONS TECHNOLOGY; INNOVATIVE APPROACHES; INTRUSION DETECTION SYSTEMS; ISOLATED SYSTEMS; NUCLEAR PLANT; SECURITY COUNTERMEASURES; SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS; SUPERVISORY CONTROL AND DATA ACQUISITION SYSTEMS; SYSTEM-OF-SYSTEMS; THEORETICAL FRAMEWORK;

EID: 79955867639     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2010.2099234     Document Type: Article
Times cited : (226)

References (16)
  • 2
    • 79955833149 scopus 로고    scopus 로고
    • last access 30/04/2010
    • [Online]. Available: http://www.digitalbond.com/index.php/research/ ids-signatures/modbus-tcp-ids-signatures/ last access 30/04/2010
  • 3
    • 77954340967 scopus 로고    scopus 로고
    • Secure selecticast for collaborative intrusion detection systems
    • P. Gross, J. Parekh, and G. Kaiser, "Secure selecticast for collaborative intrusion detection systems," in Proc. Int. Workshop on DEBS, 2004.
    • (2004) Proc. Int. Workshop on DEBS
    • Gross, P.1    Parekh, J.2    Kaiser, G.3
  • 5
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Washington, DC
    • F. Cuppens and A. Miège, "Alert correlation in a cooperative intrusion detection framework," in Proc. 2002 IEEE Symp. Security and Privacy, Washington, DC, 2002, p. 202.
    • (2002) Proc. 2002 IEEE Symp. Security and Privacy , pp. 202
    • Cuppens, F.1    Miège, A.2
  • 6
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • Washington, D.C. Nov.
    • P. Ning, Y. Cui, and D. S. Reeves, "Constructing attack scenarios through correlation of intrusion alerts," in Proc. ACM Conf. Comput. Commun. Security, Washington, D.C., Nov. 2002, pp. 245-254.
    • (2002) Proc. ACM Conf. Comput. Commun. Security , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 7
    • 84902345608 scopus 로고    scopus 로고
    • E. Goetz and S. Shenoi, Eds. New York: Springer, Critical Infrastructure Protection, IFIP International Federation for Information Processing
    • S. Slay and M. Miller, Lessons Learned from the Maroochy Water Breach, E. Goetz and S. Shenoi, Eds. New York: Springer, 2008, vol. 253, Critical Infrastructure Protection, pp. 73-82, IFIP International Federation for Information Processing.
    • (2008) Lessons Learned from the Maroochy Water Breach , vol.253 , pp. 73-82
    • Slay, S.1    Miller, M.2
  • 8
    • 77955698013 scopus 로고    scopus 로고
    • An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants
    • Rzeszow, Poland, May 13-15
    • I. Nai Fovino, M. Masera, L. Guidi, and G. Carpi, "An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants," in Proc. IEEE 3rd Int. Conf. Human System Interaction, Rzeszow, Poland, May 13-15, 2010, pp. 679-686.
    • (2010) Proc. IEEE 3rd Int. Conf. Human System Interaction , pp. 679-686
    • Nai Fovino, I.1    Masera, M.2    Guidi, L.3    Carpi, G.4
  • 9
    • 84891752381 scopus 로고    scopus 로고
    • New York: Springer, 1868-4238, IFIP Advances in Information and Communication Technology
    • S. East, J. Butts, M. Papa, and S. Shenoi, A Taxonomy of Attacks on the DNP3 Protocol.. New York: Springer, vol. 311/2009, pp. 67-81, 1868-4238, IFIP Advances in Information and Communication Technology.
    • (2009) A Taxonomy of Attacks on the DNP3 Protocol , vol.311 , pp. 67-81
    • East, S.1    Butts, J.2    Papa, M.3    Shenoi, S.4
  • 12
    • 0031148143 scopus 로고    scopus 로고
    • Supervision, fault-detection and fault-diagnosis methods - An introduction
    • DOI 10.1016/S0967-0661(97)00046-4, PII S0967066197000464
    • R. Isermann, "Supervision, fault-detection and fault-diagnosis methods. An introduction," Control Engineering Practice, vol. 5, no. 5, pp. 639-652, 1997. (Pubitemid 27414356)
    • (1997) Control Engineering Practice , vol.5 , Issue.5 , pp. 639-652
    • Isermann, R.1
  • 13
    • 0021468997 scopus 로고
    • Process fault detection based on modelling and estimation methods-A survey
    • R. Isermann, "Process fault detection based on modelling and estimation methods-A survey," Automatica, vol. 20, no. 4, pp. 1287-1298, 1984.
    • (1984) Automatica , vol.20 , Issue.4 , pp. 1287-1298
    • Isermann, R.1
  • 14
    • 0008881998 scopus 로고
    • Advanced fault detection and isolation schemes using non linear and robust observers
    • Munich, Germany
    • P. M. Frank, "Advanced fault detection and isolation schemes using non linear and robust observers," in 10th IFAC Congress, Munich, Germany, 1987, vol. 3, pp. 63-68.
    • (1987) 10th IFAC Congress , vol.3 , pp. 63-68
    • Frank, P.M.1
  • 16
    • 34249727108 scopus 로고    scopus 로고
    • The role of wireless sensor networks in the area of critical information infrastructure protection
    • DOI 10.1016/j.istr.2007.02.003, PII S1363412707000052
    • R. Roman, C. Alcaraz, and J. Lopez, "The role of wireless sensor networks in the area of critical information infrastructure protection," Inf. Secur. Tech. Rep., vol. 12, no. 1, pp. 24-31, 2007. (Pubitemid 46829995)
    • (2007) Information Security Technical Report , vol.12 , Issue.1 , pp. 24-31
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.