Using a Specification-based Intrusion Detection System to Extend the DNP3 Protocol with Security Functionalities
暂无分享,去创建一个
Ravishankar K. Iyer | Hui Lin | Zbigniew Kalbarczyk | Adam Slagell | Z. Kalbarczyk | A. Slagell | Hui Lin | R. Iyer
[1] Pieter H. Hartel,et al. MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures , 2011, 2011 Seventh European Conference on Computer Network Defense.
[2] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[3] Timothy Grance,et al. Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security , 2006 .
[4] Ravishankar K. Iyer,et al. Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol , 2013, CSIIRW '13.
[5] Vern Paxson,et al. Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context , 2005, DIMVA.
[6] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[7] Timothy M. Yardley,et al. Exploring convergence for SCADA Networks , 2011, ISGT 2011.
[8] Alfonso Valdes,et al. Communication pattern anomaly detection in process control systems , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[9] Larry L. Peterson,et al. binpac: a yacc for writing application protocol parsers , 2006, IMC '06.
[10] L. Tong,et al. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[11] Francesco Parisi-Presicce,et al. DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework , 2007 .
[12] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[13] Robert J. Turk. Cyber Incidents Involving Control Systems , 2005 .
[14] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[15] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[16] Vern Paxson,et al. A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.
[17] William H. Sanders,et al. Specification-Based Intrusion Detection for Advanced Metering Infrastructures , 2011, 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing.