Intrusion Detection for SCADA Systems

[1]  Hong Peng,et al.  A Defense Model Study Based on IDS and Firewall Linkage , 2010, 2010 International Conference of Information Science and Management Engineering.

[2]  Yan-ping Chen,et al.  Research on a High Efficient Intrusion Prevention Model , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[3]  Zhiliang Zhu,et al.  Research of intrusion detection system based on vulnerability scanner , 2010, 2010 2nd International Conference on Advanced Computer Control.

[4]  T. Kropp System threats and vulnerabilities [power system protection] , 2006, IEEE Power and Energy Magazine.

[5]  I.H. Elhajj,et al.  Distributed and Collaborative Intrusion Detection Systems , 2008, 2008 IEEE Lebanon Communications Workshop.

[6]  Zehua Chen,et al.  An adaptive real-time intrusion detection system using sequences of system call , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[7]  Christoph Meinel,et al.  An Extensible and Virtualization-Compatible IDS Management Architecture , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[8]  Zhao Quangang A new model of intelligent hybrid detection system , 2010, 2010 International Conference on Networking and Digital Society.

[9]  Usman Ahmed,et al.  Host based intrusion detection using RBF neural networks , 2009, 2009 International Conference on Emerging Technologies.

[10]  HyungJun Kim,et al.  Reducing security vulnerabilities for critical infrastructure , 2009 .

[11]  John W. Lockwood,et al.  SIFT: snort intrusion filter for TCP , 2005, 13th Symposium on High Performance Interconnects (HOTI'05).

[12]  Fakhri Karray,et al.  Lightweight IDS Based on Features Selection and IDS Classification Scheme , 2009, 2009 International Conference on Computational Science and Engineering.

[13]  Milos Manic,et al.  Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.

[14]  Ulf Lindqvist,et al.  Using Model-based Intrusion Detection for SCADA Networks , 2006 .

[15]  Igor Nai Fovino,et al.  Modbus/DNP3 State-Based Intrusion Detection System , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[16]  Zulaiha Ali Othman,et al.  Multilayer packet tagging for network behaviour analysis , 2010, 2010 International Symposium on Information Technology.

[17]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[18]  Thomas D. Tarman,et al.  Asynchronous transfer mode (ATM) intrusion detection , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[19]  Zhimin Zhou,et al.  The study on network intrusion detection system of Snort , 2010, 2010 International Conference on Networking and Digital Society.

[20]  Ma Jun,et al.  Research of intrusion detection system based on machine learning , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[21]  A. Daneels,et al.  Современные SCADA-системы , 2017 .

[22]  Stefan Lüders CONTROL SYSTEMS UNDER ATTACK , 2005 .

[23]  Arshad Iqbal,et al.  Network Traffic Analysis and Intrusion Detection Using Packet Sniffer , 2010, 2010 Second International Conference on Communication Software and Networks.

[24]  Hossein Shirazi,et al.  Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall , 2009, 2009 International Joint Conference on Artificial Intelligence.

[25]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[26]  Salim Hariri,et al.  A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.

[27]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[28]  R. D. Williams,et al.  Security and SCADA protocols , 2006 .

[29]  Salvatore D'Antonio,et al.  High-Speed Intrusion Detection in Support of Critical Infrastructure Protection , 2006, CRITIS.

[30]  Hui Li,et al.  Research on intelligent intrusion prevention system based on Snort , 2010, 2010 International Conference on Computer, Mechatronics, Control and Electronic Engineering.

[31]  Peeyush Jain,et al.  An Adaptive Intrusion Prevention System Based on Immunity , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[32]  Deborah A. Frincke,et al.  Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[33]  Robert J. Turk Cyber Incidents Involving Control Systems , 2005 .

[34]  Chunlei Wang,et al.  A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.

[35]  Joni da Silva Fraga,et al.  Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.

[36]  Jong-Soo Jang,et al.  Kernel-level intrusion detection method using simplification and grouping , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[37]  Craig Valli SCADA Forensics with Snort IDS , 2009 .