메뉴 건너뛰기




Volumn , Issue , 2015, Pages 13-24

Sequence-aware intrusion detection in industrial control systems

Author keywords

Cyber physical system; Intrusion detection system; Semantic attack; Sequence attack

Indexed keywords

COMPUTER CRIME; CONTROL SYSTEMS; CYBER PHYSICAL SYSTEM; DAMAGE DETECTION; EMBEDDED SYSTEMS; NETWORK SECURITY; SEMANTICS; WATER TREATMENT;

EID: 84929713854     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2732198.2732200     Document Type: Conference Paper
Times cited : (164)

References (27)
  • 3
    • 84951871136 scopus 로고    scopus 로고
    • Modeling message sequences for intrusion detection in industrial control systems
    • Springer,. To appear
    • M. Caselli, E. Zambon, J. Petit, and F. Kargl. Modeling message sequences for intrusion detection in industrial control systems. In Critical Infrastructure Protection IX. Springer, 2015. To appear.
    • (2015) Critical Infrastructure Protection , vol.9
    • Caselli, M.1    Zambon, E.2    Petit, J.3    Kargl, F.4
  • 5
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi. Towards a taxonomy of intrusion-detection systems. Elsevier Computer Networks, 31(8):805-822, 1999.
    • (1999) Elsevier Computer Networks , vol.31 , Issue.8 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 6
    • 82855183442 scopus 로고    scopus 로고
    • Systems-part 5-104: Transmission protocols-network access for iec 60870-5-101 using standard transport profiles
    • 60870
    • Equipment, IEC Telecontrol. Systems-part 5-104: Transmission protocols-network access for iec 60870-5-101 using standard transport profiles. IEC Standard, 60870, 2006.
    • (2006) IEC Standard
    • Iec Telecontrol, E.1
  • 10
    • 84867893847 scopus 로고    scopus 로고
    • N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
    • Springer
    • D. Hadžiosmanović, L. Simionato, D. Bolzoni, E. Zambon, and S. Etalle. N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols. In RAID, pages 354-373. Springer, 2012.
    • (2012) RAID , pp. 354-373
    • Hadžiosmanović, D.1    Simionato, L.2    Bolzoni, D.3    Zambon, E.4    Etalle, S.5
  • 23
    • 84881143298 scopus 로고    scopus 로고
    • Guide to industrial control systems (ICS) security
    • K. Stouffer, J. Falco, and K. Scarfone. Guide to industrial control systems (ICS) security. NIST Special Publication, 800(82):16-16, 2008.
    • (2008) NIST Special Publication , vol.800 , Issue.82 , pp. 16-16
    • Stouffer, K.1    Falco, J.2    Scarfone, K.3
  • 25
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Springer
    • K. Wang and S. J. Stolfo. Anomalous payload-based network intrusion detection. In Recent Advances in Intrusion Detection, pages 203-222. Springer, 2004.
    • (2004) Recent Advances in Intrusion Detection , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.