메뉴 건너뛰기




Volumn 10, Issue , 2015, Pages 59-70

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems

Author keywords

Anomaly Detection; Modbus TCP Protocol; SCADA Systems; Security

Indexed keywords

SCADA SYSTEMS;

EID: 84939271847     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2015.05.001     Document Type: Article
Times cited : (93)

References (34)
  • 6
    • 78349299834 scopus 로고    scopus 로고
    • Stuxnet, the real start of cyber warfare?
    • Chen T. Stuxnet, the real start of cyber warfare?. IEEE Network 2010, vol. 24(6):2-3.
    • (2010) IEEE Network , vol.24 , Issue.6 , pp. 2-3
    • Chen, T.1
  • 9
    • 84904211301 scopus 로고    scopus 로고
    • InfoSec Reading Room, SANS Institute, Bethesda, Maryland
    • J. Diaz, Using Snort for Intrusion Detection in Modbus TCP/IP Communications, InfoSec Reading Room, SANS Institute, Bethesda, Maryland (), 2011. http://www.sans.org/reading-room/whitepapers/detection/%20snort-intrusion-detection-modbus-tcp-ip-communications-33844.
    • (2011) Using Snort for Intrusion Detection in Modbus TCP/IP Communications
    • Diaz, J.1
  • 10
    • 84939273139 scopus 로고    scopus 로고
    • Digital Bond, Modbus TCP rules, Sunrise, Florida
    • Digital Bond, Modbus TCP rules, Sunrise, Florida . http://www.digitalbond.com/tools/quickdraw/modbus-tcp-rules.
  • 11
    • 84984477151 scopus 로고
    • Exponential smoothing: The state of the art
    • Gardner E. Exponential smoothing: The state of the art. Journal of Forecasting 1985, vol. 4(1):1-28.
    • (1985) Journal of Forecasting , vol.4 , Issue.1 , pp. 1-28
    • Gardner, E.1
  • 18
    • 85001619835 scopus 로고    scopus 로고
    • Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics
    • Kleinmann A., Wool A. Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics. Journal of Digital Forensics, Security and Law 2014, vol. 9(2):37-50.
    • (2014) Journal of Digital Forensics, Security and Law , vol.9 , Issue.2 , pp. 37-50
    • Kleinmann, A.1    Wool, A.2
  • 19
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • Langner R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security and Privacy 2011, vol. 9(3):49-51.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 20
    • 34247990255 scopus 로고
    • On the Kolmogorov-Smirnov test for normality with mean and variance unknown
    • Lilliefors H. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American Statistical Association 1967, vol. 62(318):399-402.
    • (1967) Journal of the American Statistical Association , vol.62 , Issue.318 , pp. 399-402
    • Lilliefors, H.1
  • 21
  • 25
    • 0001454867 scopus 로고
    • On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling
    • Pearson K. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 1900, vol. 50(302):157-175.
    • (1900) The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science , vol.50 , Issue.302 , pp. 157-175
    • Pearson, K.1
  • 26
    • 0018655271 scopus 로고
    • On the power of the index of dispersion test to detect spatial patterns
    • Perry J., Mead R. On the power of the index of dispersion test to detect spatial patterns. Biometrics 1979, vol. 35(3):613-622.
    • (1979) Biometrics , vol.35 , Issue.3 , pp. 613-622
    • Perry, J.1    Mead, R.2
  • 28
    • 0000898845 scopus 로고
    • An analysis of variance test for normality (complete samples)
    • Shapiro S., Wilk M. An analysis of variance test for normality (complete samples). Biometrika 1965, vol. 52(3-4):591-611.
    • (1965) Biometrika , vol.52 , Issue.3-4 , pp. 591-611
    • Shapiro, S.1    Wilk, M.2
  • 30
    • 84882738173 scopus 로고    scopus 로고
    • Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD)
    • Menlo Park, California ().
    • SRI International, Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD), Menlo Park, California (). http://www.csl.sri.com/projects/emerald.
  • 34
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-chain model for cyber-attack detection
    • Ye N., Zhang Y., Borror C. Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 2004, vol. 53(1):116-123.
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.