Data driven intrusion detection system for software defined networking enabled industrial internet of things

[1]  Sridhar Adepu,et al.  A Dataset to Support Research in the Design of Secure Water Treatment Systems , 2016, CRITIS.

[2]  K. McLaughlin,et al.  Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.

[3]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[4]  Zonghua Zhang,et al.  Enabling security functions with SDN: A feasibility study , 2015, Comput. Networks.

[5]  Mohammad M. Masud,et al.  Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[6]  Fernando M. V. Ramos,et al.  Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.

[7]  Kevin Jones,et al.  A review of cyber security risk assessment methods for SCADA systems , 2016, Comput. Secur..

[8]  Jeong-dong Ryoo,et al.  A Sophisticated Packet Forwarding Scheme with Deep Packet Inspection in an OpenFlow Switch , 2016, 2016 International Conference on Software Networking (ICSN).

[9]  Stavros Ntalampiras,et al.  Automatic identification of integrity attacks in cyber-physical systems , 2016, Expert Syst. Appl..

[10]  Zahir Tari,et al.  An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Umamakeswari Arumugam,et al.  Employing invariants for anomaly detection in software defined networking based industrial internet of things , 2018, J. Intell. Fuzzy Syst..

[12]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[13]  Stavros Ntalampiras,et al.  Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.

[14]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[15]  Zhiliang Wang,et al.  False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..

[16]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[17]  Sun-il Kim,et al.  Efficient tuning methodologies for a network payload anomaly inspection scheme , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[18]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[19]  Salima Benbernou,et al.  A survey on service quality description , 2013, CSUR.

[20]  Sridhar Adepu,et al.  An Investigation into the Response of a Water Treatment System to Cyber Attacks , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[21]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.