Nothing Special   »   [go: up one dir, main page]

Khan et al., 2020 - Google Patents

Lightweight testbed for cybersecurity experiments in scada-based systems

Khan et al., 2020

Document ID
6663718768976021531
Author
Khan M
Rehman O
Rahman I
Ali S
Publication year
Publication venue
2020 International Conference on Computing and Information Technology (ICCIT-1441)

External Links

Snippet

A rapid rise in cyber-attacks on Cyber Physical Systems (CPS) has been observed in the last decade. It becomes even more concerning that several of these attacks were on critical infrastructures that indeed succeeded and resulted into significant physical and financial …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Elsayed et al. InSDN: A novel SDN intrusion dataset
Kiran et al. Building a intrusion detection system for IoT environment using machine learning techniques
Gómez et al. On the generation of anomaly detection datasets in industrial control systems
Koroniotis et al. The sair-iiot cyber testbed as a service: A novel cybertwins architecture in iiot-based smart airports
Awad et al. Tools, techniques, and methodologies: A survey of digital forensics for scada systems
CN112615836A (en) Industrial control network safety protection simulation system
Cook et al. Attribution of cyber attacks on industrial control systems
Simoes et al. On the use of honeypots for detecting cyber attacks on industrial control networks
Kumar et al. Multi platform honeypot for generation of cyber threat intelligence
Khan et al. Lightweight testbed for cybersecurity experiments in scada-based systems
CN112688932A (en) Honeypot generation method, honeypot generation device, honeypot generation equipment and computer readable storage medium
Mubarak et al. Industrial datasets with ICS testbed and attack detection using machine learning techniques
Rubio et al. Tracking apts in industrial ecosystems: A proof of concept
Lucchese et al. HoneyICS: A high-interaction physics-aware honeynet for industrial control systems
Lupia et al. ICS Honeypot Interactions: A Latitudinal Study
Banik et al. Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed
Zamiri-Gourabi et al. Gas what? i can see your gaspots. studying the fingerprintability of ics honeypots in the wild
Abdelkhalek et al. Ml-based anomaly detection system for der dnp3 communication in smart grid
Obeidat et al. Smart approach for botnet detection based on Network Traffic analysis
Waagsnes et al. Intrusion Detection System Test Framework for SCADA Systems.
Pashaei et al. Improving the IDS performance through early detection approach in local area networks using industrial control systems of honeypot
Erlansari et al. Early Intrusion Detection System (IDS) using Snort and Telegram approach
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Anastasiadis et al. A novel high-interaction honeypot network for internet of vehicles
Årnes et al. Using a virtual security testbed for digital forensic reconstruction