메뉴 건너뛰기




Volumn , Issue , 2016, Pages 791-806

Specification mining for intrusion detection in networked control systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; INTELLIGENT BUILDINGS; INTRUSION DETECTION; MAN MACHINE SYSTEMS; SPECIFICATIONS;

EID: 85029448151     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (42)

References (65)
  • 11
    • 0005421060 scopus 로고
    • ECHELON CORPORATION. LonTalk protocol specification v3.0, 1994. http://www.enerlon.com/JobAids/Lontalk%20Protocol%20Spec.pdf.
    • (1994) LonTalk Protocol Specification V3.0
  • 15
    • 0040076126 scopus 로고    scopus 로고
    • Automatic labeling of semantic roles
    • GILDEA, D., AND JURAFSKY, D. Automatic labeling of semantic roles. Computational Linguistics 28, 3 (2002), 245–288.
    • (2002) Computational Linguistics , vol.28 , Issue.3 , pp. 245-288
    • Gildea, D.1    Jurafsky, D.2
  • 20
    • 77953581925 scopus 로고    scopus 로고
    • Networked control system: Overview and research trends
    • GUPTA, R. A., AND CHOW, M. Networked control system: Overview and research trends. IEEE Trans. Industrial Electronics 57, 7 (2010), 2527–2535.
    • (2010) IEEE Trans. Industrial Electronics , vol.57 , Issue.7 , pp. 2527-2535
    • Gupta, R.A.1    Chow, M.2
  • 30
    • 77958603308 scopus 로고    scopus 로고
    • The importance, design and implementation of a middleware for networked control systems
    • KIM, K., AND KUMAR, P. R. The importance, design and implementation of a middleware for networked control systems. Springer Lecture Notes in Control and Information Sciences 406, 1 (2010), 1–29.
    • (2010) Springer Lecture Notes in Control and Information Sciences , vol.406 , Issue.1 , pp. 1-29
    • Kim, K.1    Kumar, P.R.2
  • 31
    • 79960771504 scopus 로고    scopus 로고
    • Security aspects of the in-vehicle network in the connected car
    • Baden-Baden, Germany, June 5-9
    • KLEBERGER, P., OLOVSSON, T., AND JONSSON, E. Security aspects of the in-vehicle network in the connected car. In IEEE Intelligent Vehicles Symposium (IV), 2011, Baden-Baden, Germany, June 5-9 (2011), pp. 528–533.
    • (2011) IEEE Intelligent Vehicles Symposium (IV), 2011 , pp. 528-533
    • Kleberger, P.1    Olovsson, T.2    Jonsson, E.3
  • 32
    • 80055059379 scopus 로고    scopus 로고
    • KNX ASSOCIATION. KNX Standard, 2011. https://www.knx.org.
    • (2011) KNX Standard
  • 34
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • Orlando, FL, USA, 5-9 December
    • KO, C., FINK, G., AND LEVITT, K. N. Automated detection of vulnerabilities in privileged programs by execution monitoring. In 10th Annual Computer Security Applications Conference, ACSAC 1994, Orlando, FL, USA, 5-9 December (1994), pp. 134–144.
    • (1994) 10th Annual Computer Security Applications Conference, ACSAC 1994 , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.N.3
  • 35
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Oakland, CA, USA, May 4-7
    • KO, C., RUSCHITZKA, M., AND LEVITT, K. N. Execution monitoring of security-critical programs in distributed systems: A specification-based approach. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 4-7 (1997), pp. 175–187.
    • (1997) IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.N.3
  • 36
    • 57749193296 scopus 로고    scopus 로고
    • An approach to specification-based attack detection for in-vehicle networks
    • Eindhoven, the Netherlands, June 4-6
    • LARSON, U. E., NILSSON, D. K., AND JONSSON, E. An approach to specification-based attack detection for in-vehicle networks. In IEEE Intelligent Vehicles Symposium (IV), 2008, Eindhoven, the Netherlands, June 4-6 (2008), pp. 220–225.
    • (2008) IEEE Intelligent Vehicles Symposium (IV), 2008 , pp. 220-225
    • Larson, U.E.1    Nilsson, D.K.2    Jonsson, E.3
  • 37
    • 84875967976 scopus 로고    scopus 로고
    • Adapting BRO into SCADA: Building a specification-based intrusion detection system for the DNP3 protocol
    • Oak Ridge, TN, USA, January 8-10
    • LIN, H., SLAGELL, A. J., MARTINO, C. D., KALBARCZYK, Z., AND IYER, R. K. Adapting Bro into SCADA: Building a specification-based intrusion detection system for the DNP3 protocol. In Cyber Security and Information Intelligence, CSIIRW ’13, Oak Ridge, TN, USA, January 8-10 (2013), p. 5.
    • (2013) Cyber Security and Information Intelligence, CSIIRW ’13 , pp. 5
    • Lin, H.1    Slagell, A.J.2    Martino, C.D.3    Kalbarczyk, Z.4    Iyer, R.K.5
  • 38
    • 70350218435 scopus 로고    scopus 로고
    • Nmap network scanning: The official Nmap project guide to network discovery and security scanning
    • LYON, G. F. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure, 2009. https://nmap.org/.
    • (2009) Insecure
    • Lyon, G.F.1
  • 42
    • 85067814868 scopus 로고    scopus 로고
    • NATIONAL JOINT APPRENTICESHIP & TECHNICAL COMMITTEE. American Technical Publishers, Inc
    • NATIONAL JOINT APPRENTICESHIP & TECHNICAL COMMITTEE. Building Automation: Control Devices and Applications. American Technical Publishers, Inc., 2008.
    • (2008) Building Automation: Control Devices and Applications
  • 46
    • 85084164413 scopus 로고    scopus 로고
    • BrO: A system for detecting network intruders in real-time
    • San Antonio, TX, USA, January 26-29
    • PAXSON, V. Bro: A system for detecting network intruders in real-time. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29 (1998).
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Paxson, V.1
  • 48
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • Vancouver, BC, Canada, July 31 August 4
    • PETRONI, N. L., FRASER, T., WALTERS, A., AND ARBAUGH, W. A. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4 (2006).
    • (2006) Proceedings of the 15th USENIX Security Symposium
    • Petroni, N.L.1    Fraser, T.2    Walters, A.3    Arbaugh, W.A.4
  • 51
    • 0033397980 scopus 로고    scopus 로고
    • Python: A programming language for software integration and development
    • SANNER, M. F. Python: a programming language for software integration and development. J Mol Graph Model 17, 1 (1999), 57–61. https://www.python.org/.
    • (1999) J Mol Graph Model , vol.17 , Issue.1 , pp. 57-61
    • Sanner, M.F.1
  • 54
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Washington, D.C., August 23-26
    • SEKAR, R., AND UPPULURI, P. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-26 (1999).
    • (1999) Proceedings of the 8th USENIX Security Symposium
    • Sekar, R.1    Uppuluri, P.2
  • 55
    • 85050342606 scopus 로고    scopus 로고
    • SPICY: A unified deep packet inspection framework dissecting all your data
    • TR-15-004
    • SOMMER, R., AMANN, J., AND HALL, S. Spicy: A unified deep packet inspection framework dissecting all your data. Tech. rep., ICSI, 2015. TR-15-004.
    • (2015) Tech. Rep., ICSI
    • Sommer, R.1    Amann, J.2    Hall, S.3
  • 56
    • 33745673835 scopus 로고    scopus 로고
    • Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks
    • Newcastle upon Tyne, UK, July 18-19, Revised Selected Papers
    • SONG, T., KO, C., TSENG, C. H., BALASUBRAMANYAM, P., CHAUDHARY, A., AND LEVITT, K. N. Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networks. In Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, Revised Selected Papers (2005), pp. 16–33.
    • (2005) Formal Aspects in Security and Trust, Third International Workshop, FAST 2005 , pp. 16-33
    • Song, T.1    Ko, C.2    Tseng, C.H.3    Balasubramanyam, P.4    Chaudhary, A.5    Levitt, K.N.6
  • 57
    • 0029307559 scopus 로고
    • Natural language information retrieval
    • STRZALKOWSKI, T. Natural language information retrieval. Inf. Process. Manage. 31, 3 (1995), 397–417.
    • (1995) Inf. Process. Manage. , vol.31 , Issue.3 , pp. 397-417
    • Strzalkowski, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.