Pfrang et al., 2018 - Google Patents
Detecting and preventing replay attacks in industrial automation networks operated with profinet IOPfrang et al., 2018
- Document ID
- 15173034916549227424
- Author
- Pfrang S
- Meier D
- Publication year
- Publication venue
- Journal of Computer Virology and Hacking Techniques
External Links
Snippet
Modern industrial facilities consist of controllers, actuators and sensors that are connected via traditional IT equipment. The ongoing integration of these systems into the communication network yields to new threats and attack possibilities. In industrial networks …
- 238000001514 detection method 0 abstract description 43
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10362057B1 (en) | Enterprise DNS analysis | |
US10348763B2 (en) | Responsive deception mechanisms | |
Radoglou-Grammatikis et al. | Attacking iec-60870-5-104 scada systems | |
Schehlmann et al. | Blessing or curse? Revisiting security aspects of Software-Defined Networking | |
Kuipers et al. | Control systems cyber security: Defense in depth strategies | |
Rodofile et al. | Extending the cyber-attack landscape for SCADA-based critical infrastructure | |
Babay et al. | Deploying intrusion-tolerant SCADA for the power grid | |
Pfrang et al. | Detecting and preventing replay attacks in industrial automation networks operated with profinet IO | |
Mishra et al. | Software defined internet of things security: properties, state of the art, and future research | |
Dondossola et al. | Effects of intentional threats to power substation control systems | |
Mehner et al. | No need to marry to change your name! attacking profinet io automation networks using dcp | |
Paul et al. | Towards the protection of industrial control systems–conclusions of a vulnerability analysis of profinet IO | |
de las Morenas et al. | Security experiences in IoT based applications for building and factory automation | |
Pfrang et al. | On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO. | |
Tippenhauer et al. | Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation | |
Johnson et al. | Soar4der: Security orchestration, automation, and response for distributed energy resources | |
Rahman et al. | Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm | |
Salazar et al. | Enhancing the resiliency of cyber-physical systems with software-defined networks | |
Balduzzi et al. | Lost in translation: when industrial protocol translation goes wrong | |
Maynard et al. | Towards understanding man-on-the-side attacks (MotS) in SCADA networks | |
Silveira et al. | Cyber vulnerability assessment of a digital secondary system in an electrical substation | |
Valli et al. | BACnet-Bridging the cyber physical divide one HVAC at a time | |
Byres et al. | Worlds in collision-ethernet and the factory floor | |
Zhang | An implementation of scada network security testbed | |
Vázquez-Ingelmo et al. | Threats behind default configurations of network devices: wired local network attacks and their countermeasures |