메뉴 건너뛰기




Volumn 7943 LNCS, Issue , 2013, Pages 61-72

Towards learning normality for anomaly detection in industrial control networks

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; AUTOMATION NETWORKS; AUTOMATION TECHNOLOGY; FLOW INFORMATIONS; INDUSTRIAL CONTROL SYSTEMS; INDUSTRIAL CONTROLS; SECURITY APPROACH; SECURITY MEASURE;

EID: 84879610439     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38998-6_8     Document Type: Conference Paper
Times cited : (23)

References (24)
  • 3
    • 77954883964 scopus 로고    scopus 로고
    • Intrusion Detection in SCADA Networks
    • Stiller, B., De Turck, F. (eds.) AIMS 2010 Springer, Heidelberg
    • Barbosa, R.R.R., Pras, A.: Intrusion Detection in SCADA Networks. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 163-166. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6155 , pp. 163-166
    • Barbosa, R.R.R.1    Pras, A.2
  • 4
    • 84861978550 scopus 로고    scopus 로고
    • Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
    • Sadre, R., Novotný, J., Čeleda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012 Springer, Heidelberg
    • Hofstede, R., Pras, A.: Real-Time and Resilient Intrusion Detection: A Flow-Based Approach. In: Sadre, R., Novotný, J., Čeleda, P., Waldburger, M., Stiller, B. (eds.) AIMS 2012. LNCS, vol. 7279, pp. 109-112. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7279 , pp. 109-112
    • Hofstede, R.1    Pras, A.2
  • 5
    • 84859034021 scopus 로고    scopus 로고
    • Difficulties in Modeling SCADA Traffic: A Comparative Analysis
    • Taft, N., Ricciato, F. (eds.) PAM 2012 Springer, Heidelberg
    • Barbosa, R.R., Sadre, R., Pras, A.: Difficulties in Modeling SCADA Traffic: A Comparative Analysis. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 126-135. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7192 , pp. 126-135
    • Barbosa, R.R.1    Sadre, R.2    Pras, A.3
  • 11
    • 84867893847 scopus 로고    scopus 로고
    • N-Gram Against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols
    • Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012 Springer, Heidelberg
    • Hadziosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-Gram Against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354-373. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7462 , pp. 354-373
    • Hadziosmanović, D.1    Simionato, L.2    Bolzoni, D.3    Zambon, E.4    Etalle, S.5
  • 13
    • 77955015254 scopus 로고    scopus 로고
    • State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
    • Rome, E., Bloomfield, R. (eds.) CRITIS 2009 Springer, Heidelberg
    • Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138-150. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6027 , pp. 138-150
    • Carcano, A.1    Fovino, I.N.2    Masera, M.3    Trombetta, A.4
  • 15
    • 84891760516 scopus 로고    scopus 로고
    • Detecting Anomalies in Process Control Networks
    • Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III Springer, Heidelberg
    • Rrushi, J., Kang, K.D.: Detecting Anomalies in Process Control Networks. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III. IFIP AICT, vol. 311, pp. 151-165. Springer, Heidelberg (2009)
    • (2009) IFIP AICT , vol.311 , pp. 151-165
    • Rrushi, J.1    Kang, K.D.2
  • 18
    • 84879631395 scopus 로고    scopus 로고
    • Snort 2.9.4
    • Snort: Snort 2.9.4, http://www.snort.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.