메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Data fusion-base anomay detection in networked critical infrastructures

Author keywords

Anomaly Detection System; Data Fusion; DDoS; MPLS; Networked Critical Infrastructures; SCADA

Indexed keywords

ANOMALY DETECTION SYSTEMS; DDOS; DISTRIBUTED DENIAL OF SERVICE ATTACK; INFORMATION AND COMMUNICATION TECHNOLOGIES; MPLS; MULTI PROTOCOL LABEL SWITCHING; REMOTE MONITORING AND CONTROL; SCADA;

EID: 84886020779     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSNW.2013.6615505     Document Type: Conference Paper
Times cited : (19)

References (27)
  • 1
    • 84858277398 scopus 로고    scopus 로고
    • Tinker tailor, soldier duqu: Why cyberespionage is more dangerous than you think
    • D. Fidler, 'Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think, " International Journal of Critical Infrastructure Protection, vol. 5, no. I, pp. 28-29, 2012.
    • (2012) International Journal of Critical Infrastructure Protection , vol.5 , Issue.1 , pp. 28-29
    • Fidler, D.1
  • 2
    • 84870338599 scopus 로고    scopus 로고
    • Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
    • B. Reaves and T. Morris, ''Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems;' International Journal of Critical Infrastructure Protection, vol. 5, no. 34, pp. 154-174, 2012.
    • (2012) International Journal of Critical Infrastructure Protection , vol.5 , Issue.34 , pp. 154-174
    • Reaves, B.1    Morris, T.2
  • 4
    • 79953895474 scopus 로고    scopus 로고
    • Lessons from stuxnet
    • april
    • T. Chen and S. Abu-Nimeh, ''Lessons from Stuxnet, " Computer, vol. 44, no. 4, pp. 91-93, april 2011.
    • (2011) Computer , vol.44 , Issue.4 , pp. 91-93
    • Chen, T.1    Abu-Nimeh, S.2
  • 5
    • 84886066025 scopus 로고    scopus 로고
    • Towards anomaly detection in scada networks using connection patterns
    • E. Pleijsier, 'Towards anomaly detection in scada networks using connection patterns, " in 18th Twente Student Conference on IT, 2013.
    • (2013) 18th Twente Student Conference on IT
    • Pleijsier, E.1
  • 17
    • 0012882330 scopus 로고
    • Theory of evidence-A survey of its mathematical foundations, applications and computational analysis
    • J. Kohlas and P. Monney, 'Theory of evidence-a survey of its mathematical foundations, applications and computational analysis, " ZOR-Mathematical Methods of Operations Research, vol. 39, pp. 35-68, 1994.
    • (1994) ZOR-Mathematical Methods of Operations Research , vol.39 , pp. 35-68
    • Kohlas, J.1    Monney, P.2
  • 19
    • 84866399058 scopus 로고    scopus 로고
    • A cyber-physical experimentation environment for the security analysis of networked industrial control systems
    • B. Genge, C. Siaterlis, I. Nai Fovino, and M. Masera, ' 'A cyber-physical experimentation environment for the security analysis of networked industrial control systems, " Computers & Electrical Engineering, vol. 38, no. 5, pp. 1146-1161, 2012.
    • (2012) Computers & Electrical Engineering , vol.38 , Issue.5 , pp. 1146-1161
    • Genge, B.1    Siaterlis, C.2    Nai Fovino, I.3    Masera, M.4
  • 20
    • 84866375520 scopus 로고    scopus 로고
    • On the use of Emulab testbeds for scientifically rigorous experiments
    • C. Siaterlis, A. Garcia, and B. Genge, "On the use of Emulab testbeds for scientifically rigorous experiments, " IEEE Communications Surveys and Tutorials, vol. PP, no. 99, pp. 1-14, 2012.
    • (2012) IEEE Communications Surveys and Tutorials , Issue.99 , pp. 1-14
    • Siaterlis, C.1    Garcia, A.2    Genge, B.3
  • 23
    • 0028369782 scopus 로고
    • Emergency load shedding to avoid risks of voltage instability using indicators
    • feb
    • T. Than, J. Fandino, N. Hadjsaid, J. Sabonnadiere, and H. Vu, "Emergency load shedding to avoid risks of voltage instability using indicators, " Power Systems, IEEE Transactions on, vol. 9, no. 1, pp. 341-351, feb 1994.
    • (1994) Power Systems, IEEE Transactions on , vol.9 , Issue.1 , pp. 341-351
    • Than, T.1    Fandino, J.2    Hadjsaid, N.3    Sabonnadiere, J.4    Vu, H.5
  • 24
    • 16244374965 scopus 로고    scopus 로고
    • Modelling the load curve of aggregate electricity consumption using principal components
    • Nov.
    • M. Manera and A. Marzullo, ''Modelling the load curve of aggregate electricity consumption using principal components, " Environ. Model. Softw., vol. 20, no. 11, pp. 1389-1400, Nov. 2005.
    • (2005) Environ. Model. Softw. , vol.20 , Issue.11 , pp. 1389-1400
    • Manera, M.1    Marzullo, A.2
  • 26
    • 84863194412 scopus 로고    scopus 로고
    • Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC)
    • C. Deccio, "Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC), " International Journal of Critical Infrastructure Protection, vol. 5, no. 2, pp. 98-103, 2012.
    • (2012) International Journal of Critical Infrastructure Protection , vol.5 , Issue.2 , pp. 98-103
    • Deccio, C.1
  • 27
    • 84858290582 scopus 로고    scopus 로고
    • Analysis of the security of VPN configurations in industrial control environments
    • S. Rahimi and M. Zargham, ''Analysis of the security of VPN configurations in industrial control environments;' International Journal of Critical Infrastructure Protection, vol. 5, no. 1, pp. 3-13, 2012.
    • (2012) International Journal of Critical Infrastructure Protection , vol.5 , Issue.1 , pp. 3-13
    • Rahimi, S.1    Zargham, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.