메뉴 건너뛰기




Volumn 7967 LNCS, Issue , 2013, Pages 160-176

Towards the protection of industrial control systems - Conclusions of a vulnerability analysis of Profinet IO

Author keywords

anomaly detection; Industrial control systems; intrusion detection; Profinet IO attacks; Profinet IO vulnerabilities

Indexed keywords

ANOMALY DETECTION; ANOMALY-BASED INTRUSION DETECTION; AUTOMATION CONTROL SYSTEM; INDUSTRIAL CONTROL SYSTEMS; INDUSTRIAL ETHERNETS; INFORMATION AND COMMUNICATION TECHNOLOGIES; PROFINET; VULNERABILITY ANALYSIS;

EID: 84881188775     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-39235-1_10     Document Type: Conference Paper
Times cited : (22)

References (23)
  • 2
    • 84876380168 scopus 로고    scopus 로고
    • Version 1.4. Symantec Security Response, Mountain View
    • W32.Duqu - The precursor to the next Stuxnet, Version 1.4. Symantec Security Response, Mountain View (2011)
    • (2011) W32.Duqu - The Precursor to the Next Stuxnet
  • 9
    • 70350453950 scopus 로고    scopus 로고
    • Exploring Network Security in PROFIsafe
    • Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. Springer, Heidelberg
    • Åkerberg, J., Björkman, M.: Exploring Network Security in PROFIsafe. In: Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. LNCS, vol. 5775, pp. 67-80. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5775 , pp. 67-80
    • Åkerberg, J.1    Björkman, M.2
  • 14
    • 50649107305 scopus 로고    scopus 로고
    • Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
    • IEEE
    • Verba, J., Milvich, M.: Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In: Proc. of the IEEE Conf. on Technologies for Homeland Security (THS 2008), pp. 469-473. IEEE (2008)
    • (2008) Proc. of the IEEE Conf. on Technologies for Homeland Security (THS 2008) , pp. 469-473
    • Verba, J.1    Milvich, M.2
  • 15
    • 77955015254 scopus 로고    scopus 로고
    • State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
    • Rome, E., Bloomfield, R. (eds.) CRITIS 2009. Springer, Heidelberg
    • Carcano, A., Fovino, I.N., Masera, M., Trombetta, A.: State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. In: Rome, E., Bloomfield, R. (eds.) CRITIS 2009. LNCS, vol. 6027, pp. 138-150. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6027 , pp. 138-150
    • Carcano, A.1    Fovino, I.N.2    Masera, M.3    Trombetta, A.4
  • 16
    • 77954883964 scopus 로고    scopus 로고
    • Intrusion Detection in SCADA Networks
    • Stiller, B., De Turck, F. (eds.) AIMS 2010. Springer, Heidelberg
    • Barbosa, R.R.R., Pras, A.: Intrusion Detection in SCADA Networks. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 163-166. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6155 , pp. 163-166
    • Barbosa, R.R.R.1    Pras, A.2
  • 18
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA Systems with Anomaly Detection
    • Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. Springer, Heidelberg
    • Bigham, J., Gamez, D., Lu, N.: Safeguarding SCADA Systems with Anomaly Detection. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 171-182. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 22
    • 84867893847 scopus 로고    scopus 로고
    • N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols
    • Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. Springer, Heidelberg
    • Hadžiosmanović, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354-373. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7462 , pp. 354-373
    • Hadžiosmanović, D.1    Simionato, L.2    Bolzoni, D.3    Zambon, E.4    Etalle, S.5
  • 23
    • 84879610439 scopus 로고    scopus 로고
    • Towards learning normality for anomaly detection in industrial control networks
    • Doyen, G.,Waldburger, M., Celeda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. Springer, Heidelberg
    • Schuster, F., Paul, A., König, H.: Towards learning normality for anomaly detection in industrial control networks. In: Doyen, G.,Waldburger, M., Celeda, P., Sperotto, A., Stiller, B. (eds.) AIMS 2013. LNCS, vol. 7943, pp. 62-73. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7943 , pp. 62-73
    • Schuster, F.1    Paul, A.2    König, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.