메뉴 건너뛰기




Volumn 13, Issue 2, 2016, Pages 252-260

Industrial Control System Network Intrusion Detection by Telemetry Analysis

Author keywords

Control systems; Intrusion detection; Networked control systems; Nonlinear network analysis; Telemetry

Indexed keywords

CONTROL SYSTEM ANALYSIS; CONTROL SYSTEMS; ENGINEERS; INTELLIGENT CONTROL; INTRUSION DETECTION; NETWORKED CONTROL SYSTEMS; NONLINEAR NETWORK ANALYSIS; TELEMETERING; TELEMETERING EQUIPMENT;

EID: 84963984264     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2015.2443793     Document Type: Article
Times cited : (141)

References (40)
  • 4
    • 84963945435 scopus 로고    scopus 로고
    • Detection of SSH host spoofing in control systems through network telemetry analysis
    • S. Ponomarev, N. Wallace, T. Atkison, "Detection of SSH host spoofing in control systems through network telemetry analysis," in Proc. Cyber Inf. Security Res. Conf., 2014, pp. 1-12.
    • (2014) Proc. Cyber Inf. Security Res. Conf. , pp. 1-12
    • Ponomarev, S.1    Wallace, N.2    Atkison, T.3
  • 11
    • 20344364652 scopus 로고    scopus 로고
    • Denial of service attacks on network-based control systems: Impact and mitigation
    • May
    • M. Long, C.-H. J. Wu, J. Y. Hung, "Denial of service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
    • (2005) IEEE Trans. Ind. Informat. , vol.1 , Issue.2 , pp. 85-96
    • Long, M.1    Wu, C.-H.J.2    Hung, J.Y.3
  • 19
    • 0038059205 scopus 로고    scopus 로고
    • IP traceback with deterministic packet marking
    • Apr.
    • A. Belenky and N. Ansari, "IP traceback with deterministic packet marking," IEEE Commun. Lett., vol. 7, no. 4, pp. 162-164, Apr. 2003.
    • (2003) IEEE Commun. Lett. , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 23
    • 78650011800 scopus 로고    scopus 로고
    • The security of modern password expiration: An algorithmic framework and empirical analysis
    • Y. Zhang, F. Monrose, M. K. Reiter, "The security of modern password expiration: An algorithmic framework and empirical analysis," in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 176-186.
    • (2010) Proc. 17th ACM Conf. Comput. Commun. Security , pp. 176-186
    • Zhang, Y.1    Monrose, F.2    Reiter, M.K.3
  • 25
    • 61749086468 scopus 로고    scopus 로고
    • Characterizing network traffic by means of the NetMine framework
    • D. Apiletti, E. Baralis, T. Cerquitelli, V. DElia, "Characterizing network traffic by means of the NetMine framework," Comput. Netw., vol. 53, no. 6, pp. 774-789, 2009.
    • (2009) Comput. Netw. , vol.53 , Issue.6 , pp. 774-789
    • Apiletti, D.1    Baralis, E.2    Cerquitelli, T.3    Delia, V.4
  • 28
    • 84879779698 scopus 로고    scopus 로고
    • Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
    • N. Goldenberg and A. Wool, "Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems," Int. J. Critical Infrastructure Protection, vol. 6, no. 2, pp. 63-75, 2013.
    • (2013) Int. J. Critical Infrastructure Protection , vol.6 , Issue.2 , pp. 63-75
    • Goldenberg, N.1    Wool, A.2
  • 29
    • 84881634307 scopus 로고    scopus 로고
    • Observing industrial control system attacks launched via metasploit framework
    • N. Wallace and T. Atkison, "Observing industrial control system attacks launched via metasploit framework," in Proc. 51st ACM Southeast Conf., 2013, pp. 22:1-22:4.
    • (2013) Proc. 51st ACM Southeast Conf. , pp. 221-224
    • Wallace, N.1    Atkison, T.2
  • 32
    • 84957069091 scopus 로고    scopus 로고
    • Naive (Bayes) at forty: The independence assumption in information retrieval
    • D. D. Lewis, "Naive (Bayes) at forty: The independence assumption in information retrieval," in Proc. 10th Eur. Conf. Mach. Learning, 1998, pp. 4-15.
    • (1998) Proc. 10th Eur. Conf. Mach. Learning , pp. 4-15
    • Lewis, D.D.1
  • 35
    • 84894460335 scopus 로고    scopus 로고
    • Effectiveness evaluation of rule based classifiers for the classification of iris data set
    • Inaugural Special Issue
    • C. L. Devasena, T. Sumathi, V. Gomathi, M. Hemalatha, "Effectiveness evaluation of rule based classifiers for the classification of iris data set," Bonfring Int. J. Man Mach. Interface, vol. 1, no. Inaugural Special Issue, pp. 05-09, 2011.
    • (2011) Bonfring Int. J. Man Mach. Interface , vol.1 , pp. 05-09
    • Devasena, C.L.1    Sumathi, T.2    Gomathi, V.3    Hemalatha, M.4
  • 39
    • 84963950708 scopus 로고    scopus 로고
    • Performance evaluation of TCP flows
    • F. Hisch, "Performance evaluation of TCP flows," Network, vol. 79, pp. 79-88, 2014.
    • (2014) Network , vol.79 , pp. 79-88
    • Hisch, F.1
  • 40
    • 74349127408 scopus 로고    scopus 로고
    • Programming with libpcap-sniffing the network from our own application
    • L. M. Garcia, "Programming with libpcap-sniffing the network from our own application," Hakin9-Comput. Security Mag., vol. 9, pp. 2-2008, 2008.
    • (2008) Hakin9-Comput. Security Mag. , vol.9 , pp. 2-2008
    • Garcia, L.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.