Nothing Special   »   [go: up one dir, main page]

Dunhaupt, 2012 - Google Patents

Vulnerabilities of industrial automation systems

Dunhaupt, 2012

View PDF
Document ID
4896830679453997188
Author
Dunhaupt S
Publication year
Publication venue
RUHR Universitat

External Links

Snippet

Recently, the security of industrial automation systems has gained interest from both researchers and the general public, most notably due to the Stuxnet malware discovered in 2010. There have been several attacks targeting industrial automation systems such as the …
Continue reading at informatik.rub.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Upadhyay et al. SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations
Panchal et al. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
Makrakis et al. Industrial and critical infrastructure security: Technical analysis of real-life security incidents
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
US11929992B2 (en) Encrypted cache protection
Dondossola et al. Effects of intentional threats to power substation control systems
Kolli et al. Remote desktop backdoor implementation with reverse TCP payload using open source tools for instructional use
WO2022208045A1 (en) Encrypted cache protection
Varadharajan et al. Techniques for Enhancing Security in Industrial Control Systems
KR20040065674A (en) Host-based security system and method
Miloslavskaya Network protection tools for network security intelligence centers
Faisal et al. Stuxnet, duqu and beyond
Miloslavskaya et al. Ensuring information security for internet of things
Dunhaupt Vulnerabilities of industrial automation systems
Nash An undirected attack against critical infrastructure
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Li et al. Research on attack mechanism of network intrusion in industrial control system
Venkatraman Autonomic context-dependent architecture for malware detection
Bartman et al. An introduction to applying network intrusion detection for industrial control systems
Ruha Cybersecurity of computer networks
Mahmood et al. Securing Industrial Internet of Things (Industrial IoT)-A Reviewof Challenges and Solutions
Kruglov et al. Threats posed by using RATs in ICS
Deep et al. Security In Smartphone: A Comparison of Viruses and Security Breaches in Phones and Computers
Endsuleit et al. A security analysis on jade (-s) v. 3.2
Albanese et al. The Case for Using Layered Defenses to Stop Worms