Dunhaupt, 2012 - Google Patents
Vulnerabilities of industrial automation systemsDunhaupt, 2012
View PDF- Document ID
- 4896830679453997188
- Author
- Dunhaupt S
- Publication year
- Publication venue
- RUHR Universitat
External Links
Snippet
Recently, the security of industrial automation systems has gained interest from both researchers and the general public, most notably due to the Stuxnet malware discovered in 2010. There have been several attacks targeting industrial automation systems such as the …
- 201000009910 diseases by infectious agent 0 abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Upadhyay et al. | SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations | |
Panchal et al. | Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures | |
Makrakis et al. | Industrial and critical infrastructure security: Technical analysis of real-life security incidents | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
US11929992B2 (en) | Encrypted cache protection | |
Dondossola et al. | Effects of intentional threats to power substation control systems | |
Kolli et al. | Remote desktop backdoor implementation with reverse TCP payload using open source tools for instructional use | |
WO2022208045A1 (en) | Encrypted cache protection | |
Varadharajan et al. | Techniques for Enhancing Security in Industrial Control Systems | |
KR20040065674A (en) | Host-based security system and method | |
Miloslavskaya | Network protection tools for network security intelligence centers | |
Faisal et al. | Stuxnet, duqu and beyond | |
Miloslavskaya et al. | Ensuring information security for internet of things | |
Dunhaupt | Vulnerabilities of industrial automation systems | |
Nash | An undirected attack against critical infrastructure | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Li et al. | Research on attack mechanism of network intrusion in industrial control system | |
Venkatraman | Autonomic context-dependent architecture for malware detection | |
Bartman et al. | An introduction to applying network intrusion detection for industrial control systems | |
Ruha | Cybersecurity of computer networks | |
Mahmood et al. | Securing Industrial Internet of Things (Industrial IoT)-A Reviewof Challenges and Solutions | |
Kruglov et al. | Threats posed by using RATs in ICS | |
Deep et al. | Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers | |
Endsuleit et al. | A security analysis on jade (-s) v. 3.2 | |
Albanese et al. | The Case for Using Layered Defenses to Stop Worms |