Nothing Special   »   [go: up one dir, main page]

Pfrang et al., 2018 - Google Patents

Detecting and preventing replay attacks in industrial automation networks operated with profinet IO

Pfrang et al., 2018

Document ID
15173034916549227424
Author
Pfrang S
Meier D
Publication year
Publication venue
Journal of Computer Virology and Hacking Techniques

External Links

Snippet

Modern industrial facilities consist of controllers, actuators and sensors that are connected via traditional IT equipment. The ongoing integration of these systems into the communication network yields to new threats and attack possibilities. In industrial networks …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
US10362057B1 (en) Enterprise DNS analysis
US10348763B2 (en) Responsive deception mechanisms
Radoglou-Grammatikis et al. Attacking iec-60870-5-104 scada systems
Schehlmann et al. Blessing or curse? Revisiting security aspects of Software-Defined Networking
Kuipers et al. Control systems cyber security: Defense in depth strategies
Rodofile et al. Extending the cyber-attack landscape for SCADA-based critical infrastructure
Babay et al. Deploying intrusion-tolerant SCADA for the power grid
Pfrang et al. Detecting and preventing replay attacks in industrial automation networks operated with profinet IO
Mishra et al. Software defined internet of things security: properties, state of the art, and future research
Dondossola et al. Effects of intentional threats to power substation control systems
Mehner et al. No need to marry to change your name! attacking profinet io automation networks using dcp
Paul et al. Towards the protection of industrial control systems–conclusions of a vulnerability analysis of profinet IO
de las Morenas et al. Security experiences in IoT based applications for building and factory automation
Pfrang et al. On the Detection of Replay Attacks in Industrial Automation Networks Operated with Profinet IO.
Tippenhauer et al. Vbump: Securing ethernet-based industrial control system networks with vlan-based traffic aggregation
Johnson et al. Soar4der: Security orchestration, automation, and response for distributed energy resources
Rahman et al. Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm
Salazar et al. Enhancing the resiliency of cyber-physical systems with software-defined networks
Balduzzi et al. Lost in translation: when industrial protocol translation goes wrong
Maynard et al. Towards understanding man-on-the-side attacks (MotS) in SCADA networks
Silveira et al. Cyber vulnerability assessment of a digital secondary system in an electrical substation
Valli et al. BACnet-Bridging the cyber physical divide one HVAC at a time
Byres et al. Worlds in collision-ethernet and the factory floor
Zhang An implementation of scada network security testbed
Vázquez-Ingelmo et al. Threats behind default configurations of network devices: wired local network attacks and their countermeasures