메뉴 건너뛰기




Volumn 4, Issue , 2017, Pages 116-128

Analysis of intrusion detection systems in industrial ecosystems

Author keywords

Industrial Control; Industry 4.0; Intrusion Detection; SCADA

Indexed keywords

ECOSYSTEMS; ELECTRONIC COMMERCE; INDUSTRY 4.0;

EID: 85029435558     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0006426301160128     Document Type: Conference Paper
Times cited : (40)

References (61)
  • 2
    • 84876124711 scopus 로고    scopus 로고
    • Wide-area situational awareness for critical infrastructure protection
    • Alcaraz, C. and Lopez, J. (2013). Wide-area situational awareness for critical infrastructure protection. IEEE Computer, 46(4):30-37.
    • (2013) IEEE Computer , vol.46 , Issue.4 , pp. 30-37
    • Alcaraz, C.1    Lopez, J.2
  • 3
    • 84887937959 scopus 로고    scopus 로고
    • Critical control system protection in the 21st century: Threats and solutions
    • Alcaraz, C. and Zeadally, S. (2013). Critical control system protection in the 21st century: Threats and solutions. IEEE Computer, 46(10):74-83.
    • (2013) IEEE Computer , vol.46 , Issue.10 , pp. 74-83
    • Alcaraz, C.1    Zeadally, S.2
  • 4
    • 85029447874 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • AlertEnterprise (2017). Sentry CyberSCADA. http://www.alertenterprise.com/products-EnterpriseSentryCybersecuritySCADA.php. [Online; Accessed March 2017].
    • (2017) Sentry CyberSCADA
  • 5
    • 85029408367 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Attivo Networks (2017). BOTsink. https://attivonetworks.com/product/attivo-botsink/. [Online; Accessed March 2017].
    • (2017) BOTsink
  • 9
    • 85029448151 scopus 로고    scopus 로고
    • Specification mining for intrusion detection in networked control systems
    • USENIX Association
    • Caselli, M., Zambon, E., Amann, J., Sommer, R., and Kargl, F. (2016). Specification mining for intrusion detection in networked control systems. In 25th USENIX Security Symposium, pages 791-806. USENIX Association.
    • (2016) 25th USENIX Security Symposium , pp. 791-806
    • Caselli, M.1    Zambon, E.2    Amann, J.3    Sommer, R.4    Kargl, F.5
  • 10
    • 85046615690 scopus 로고    scopus 로고
    • Cyber stealth attacks in critical information infrastructures
    • Cazorla, L., Alcaraz, C., and Lopez, J. (2016). Cyber stealth attacks in critical information infrastructures. IEEE Systems Journal, pages 1-15.
    • (2016) IEEE Systems Journal , pp. 1-15
    • Cazorla, L.1    Alcaraz, C.2    Lopez, J.3
  • 13
    • 85029404496 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • CISCO Systems (2017). CISCO: Protecting ICS with Industrial Signatures. http://www.cisco.com/c/en/us/about/securitycenter/protecting-industrial-control-systemsnetworks-ips.html. [Online; Accessed March 2017].
    • (2017) CISCO: Protecting ICS with Industrial Signatures
  • 14
    • 85029449676 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Control-See (2017). UCME-OPC. http://www.controlsee.com/u-c-me-opc/. [Online; Accessed March 2017].
    • (2017) UCME-OPC
  • 15
    • 85029458963 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Cyberbit (2017). SCADAShield. https://www.cyberbit.net/solutions/ics-scadasecurity-continuity/. [Online; Accessed March 2017].
    • (2017) SCADAShield
  • 16
    • 85029443882 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • CyberX (2017). XSense. https://cyberxlabs.com/en/xsense/. [Online; Accessed March 2017].
    • (2017) XSense
  • 17
    • 85029416353 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • DarkTrace (2017). Enterprise Immune System. https://www.darktrace.com/technology/#enterpriseimmune-system. [Online; Accessed March 2017].
    • (2017) Enterprise Immune System
  • 19
    • 84991780822 scopus 로고    scopus 로고
    • Detecting plc control corruption via on-device runtime verification
    • Garcia, L., Zonouz, S., Wei, D., and de Aguiar, L. P. (2016). Detecting plc control corruption via on-device runtime verification. In 2016 Resilience Week (RWS), pages 67-72.
    • (2016) 2016 Resilience Week (RWS , pp. 67-72
    • Garcia, L.1    Zonouz, S.2    Wei, D.3    De Aguiar, L.P.4
  • 24
    • 85029408379 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Halo Analytics (2017). Halo Vision. https://www.haloanalytics.com/. [Online; Accessed March 2017].
    • (2017) Halo Vision
  • 25
    • 85029429924 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • HeSec (2017). HeSec Smart Agents. http://hesec.com/products/. [Online; Accessed March 2017].
    • (2017) HeSec Smart Agents
  • 26
    • 85007188543 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • ICS-CERT (2016). Overview of Cyber Vulnerabilities. http://ics-cert.us-cert.gov/content/overviewcyber-vulnerabilities. [Online; Accessed March 2017].
    • (2016) Overview of Cyber Vulnerabilities
  • 27
    • 85029408027 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • ICS2 (2017). ICS2 On-Guard. http://ics2.com/productsolution/. [Online; Accessed March 2017].
    • (2017) ICS2 On-Guard
  • 33
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3):49-51.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 34
    • 85029438471 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Leidos (2016). Insider Threat Detection Platform-Wisdom ITI. https://cyber.leidos.com/products/insider-threatdetection. [Online; Accessed March 2017].
    • (2016) Insider Threat Detection Platform-Wisdom ITI
  • 39
    • 84921378651 scopus 로고    scopus 로고
    • Monitoring security of networked control systems: It's the physics
    • McParland, C., Peisert, S., and Scaglione, A. (2014). Monitoring security of networked control systems: It's the physics. IEEE Security Privacy, 12(6):32-39.
    • (2014) IEEE Security Privacy , vol.12 , Issue.6 , pp. 32-39
    • McParland, C.1    Peisert, S.2    Scaglione, A.3
  • 40
    • 85029422860 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Mission Secure (2017). MSi Secure Sentinel Platform. http://www.missionsecure.com/solutions/. [Online; Accessed March 2017].
    • (2017) MSi Secure Sentinel Platform
  • 41
    • 0013347631 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Mitre (2017). Common Vulnerabilities and Exposures. https://cve.mitre.org/. [Online; Accessed March 2017].
    • (2017) Common Vulnerabilities and Exposures
  • 43
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha, A. and Park, J.-M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks, 51(12):3448-3470.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 44
    • 84963984264 scopus 로고    scopus 로고
    • Industrial control system network intrusion detection by telemetry analysis
    • Ponomarev, S. and Atkison, T. (2016). Industrial control system network intrusion detection by telemetry analysis. IEEE Transactions on Dependable and Secure Computing, 13(2):252-260.
    • (2016) IEEE Transactions on Dependable and Secure Computing , vol.13 , Issue.2 , pp. 252-260
    • Ponomarev, S.1    Atkison, T.2
  • 45
    • 84885616228 scopus 로고    scopus 로고
    • Structural controllability of multi-agent networks: Robustness against simultaneous failures
    • Rahimian, M. A. and Aghdam, A. G. (2013). Structural controllability of multi-agent networks: Robustness against simultaneous failures. Automatica, 49(11):3149-3157.
    • (2013) Automatica , vol.49 , Issue.11 , pp. 3149-3157
    • Rahimian, M.A.1    Aghdam, A.G.2
  • 49
    • 85029425707 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • Siemens (2017). SIMATIC OPC UA. http://www.industry.siemens.com/topics/global/en/tiaportal/software/details/pages/opc-ua.aspx. [Online; Accessed March 2017].
    • (2017) SIMATIC OPC UA
  • 50
    • 85029449580 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • SIGA (2017). SIGA Guard. http://www.sigasec.com. [Online; Accessed March 2017].
    • (2017) SIGA Guard
  • 51
    • 85073085170 scopus 로고    scopus 로고
    • A comprehensive study on apt attacks and countermeasures for future networks and communications: Challenges and solutions
    • Singh, S., Sharma, P. K., Moon, S. Y., Moon, D., and Park, J. H. (2016). A comprehensive study on apt attacks and countermeasures for future networks and communications: challenges and solutions. The Journal of Supercomputing, pages 1-32.
    • (2016) The Journal of Supercomputing , pp. 1-32
    • Singh, S.1    Sharma, P.K.2    Moon, S.Y.3    Moon, D.4    Park, J.H.5
  • 52
    • 84929282641 scopus 로고    scopus 로고
    • Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process
    • Stone, S. J., Temple, M. A., and Baldwin, R. O. (2015). Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process. International Journal of Critical Infrastructure Protection, 9:41-51.
    • (2015) International Journal of Critical Infrastructure Protection , vol.9 , pp. 41-51
    • Stone, S.J.1    Temple, M.A.2    Baldwin, R.O.3
  • 57
    • 84906832119 scopus 로고    scopus 로고
    • Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation
    • Wu, D., Rosen, D. W., Wang, L., and Schaefer, D. (2015). Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation. Computer-Aided Design, 59:1-14.
    • (2015) Computer-Aided Design , vol.59 , pp. 1-14
    • Wu, D.1    Rosen, D.W.2    Wang, L.3    Schaefer, D.4
  • 58
    • 85029411498 scopus 로고    scopus 로고
    • [Online; Accessed March 2017]
    • WurldTech (GE) (2017). OPShield. https://www.wurldtech.com/products/opshield. [Online; Accessed March 2017].
    • (2017) OPShield
  • 60
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the internet of things
    • Zhang, K., Liang, X., Lu, R., and Shen, X. (2014). Sybil attacks and their defenses in the internet of things. IEEE Internet of Things Journal, 1(5):372-383.
    • (2014) IEEE Internet of Things Journal , vol.1 , Issue.5 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.