메뉴 건너뛰기




Volumn , Issue , 2016, Pages 137-145

Wireless intrusion detection of covert channel attacks in ITU-T G.9959-based networks

Author keywords

Covert channel; Intrusion detection; Wireless sensor networks; Wireless threats; Z Wave

Indexed keywords

ACCESS CONTROL; COMPUTER CRIME; CONTROLLERS; GATEWAYS (COMPUTER NETWORKS); INTRUSION DETECTION; MALWARE; MEDIUM ACCESS CONTROL; MERCURY (METAL); NETWORK SECURITY; RADIO COMMUNICATION; RADIO TRANSMISSION; SOFTWARE RADIO;

EID: 84969243995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 1
    • 84969210510 scopus 로고    scopus 로고
    • Compromising industrial facilities from 40 miles away
    • Nevada, USA, July
    • Apa, L. and Hollman, C. (2013) "Compromising Industrial Facilities from 40 Miles Away," Black Hat Conference, Nevada, USA, July.
    • (2013) Black Hat Conference
    • Apa, L.1    Hollman, C.2
  • 2
    • 84951872109 scopus 로고    scopus 로고
    • Evaluating ITU-T G.9959 based wireless systems used in critical infrastructure assets
    • Shenoi, S. and Rice, M. Eds. Heidelberg, Germany: Springer International Publishing
    • Badenhop, C., Fuller, J., Hall, J., Ramsey, B., and Rice, M. (2015) "Evaluating ITU-T G.9959 Based Wireless Systems used in Critical Infrastructure Assets," in Critical Infrastructure Protection IX, Shenoi, S. and Rice, M. Eds. Heidelberg, Germany: Springer International Publishing, pp 209-227.
    • (2015) Critical Infrastructure Protection IX , pp. 209-227
    • Badenhop, C.1    Fuller, J.2    Hall, J.3    Ramsey, B.4    Rice, M.5
  • 4
    • 84962183588 scopus 로고    scopus 로고
    • Home invasion V2.0 - Attacking network-controlled hardware
    • Nevada, USA, July
    • Crowley, D., Bryan, D., and Savage, J. (2013) "Home Invasion V2.0 - Attacking Network-Controlled Hardware," Black Hat Conference, Nevada, USA, July.
    • (2013) Black Hat Conference
    • Crowley, D.1    Bryan, D.2    Savage, J.3
  • 5
    • 84969186063 scopus 로고    scopus 로고
    • Security evaluation of the Z-wave wireless protocol
    • Nevada, USA, July
    • Fouladi, B. and Ghanoun, S. (2013) "Security Evaluation of the Z-Wave Wireless Protocol," Black Hat Conference, Nevada, USA, July.
    • (2013) Black Hat Conference
    • Fouladi, B.1    Ghanoun, S.2
  • 10
    • 84931091579 scopus 로고    scopus 로고
    • Application of ensemble decision tree classifiers to ZigBee device network authentication using RF-DNA fingerprinting
    • March
    • Patel, H., Temple, M., Baldwin, R., and Ramsey, B. (2014) "Application of Ensemble Decision Tree Classifiers to ZigBee Device Network Authentication Using RF-DNA Fingerprinting," 9th International Conference on Cyber Warfare and Security, March, pp 176-186.
    • (2014) 9th International Conference on Cyber Warfare and Security , pp. 176-186
    • Patel, H.1    Temple, M.2    Baldwin, R.3    Ramsey, B.4
  • 11
    • 84969265816 scopus 로고    scopus 로고
    • Bringing software defined radio to the penetration testing community
    • Nevada, USA, August
    • Picod, J., Lebrun, A., and Demay, J. (2014) "Bringing Software Defined Radio to the Penetration Testing Community," Black Hat Conference, Nevada, USA, August.
    • (2014) Black Hat Conference
    • Picod, J.1    Lebrun, A.2    Demay, J.3
  • 12
    • 84993936186 scopus 로고    scopus 로고
    • Defensive rekeying strategies for physical-layer-monitored low-rate wireless personal area networks
    • J. Butts and S. Shenoi, Eds. Heidelberg, Germany: Springer, March
    • Ramsey, B. and Mullins, B. (2013) "Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks," Critical Infrastructure Protection VII, J. Butts and S. Shenoi, Eds. Heidelberg, Germany: Springer, March, pp 63-79.
    • (2013) Critical Infrastructure Protection VII , pp. 63-79
    • Ramsey, B.1    Mullins, B.2
  • 14
    • 84870338599 scopus 로고    scopus 로고
    • Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
    • March
    • Reaves, B. and Morris, T. (2012) "Analysis and Mitigation of Vulnerabilities in Short-Range Wireless Communications for Industrial Control Systems," International Journal of Critical Infrastructure Protection, Vol 5, March, pp 154-174.
    • (2012) International Journal of Critical Infrastructure Protection , vol.5 , pp. 154-174
    • Reaves, B.1    Morris, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.