Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network
暂无分享,去创建一个
[1] Aiko Pras,et al. Exploiting traffic periodicity in industrial control networks , 2016, Int. J. Crit. Infrastructure Prot..
[2] Aiko Pras,et al. Towards periodicity based anomaly detection in SCADA networks , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).
[3] L. Ibrahim. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .
[4] Rayford B. Vaughn,et al. Deterministic Intrusion Detection Rules for MODBUS Protocols , 2013, 2013 46th Hawaii International Conference on System Sciences.
[5] Babu M. Mehtre,et al. Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks , 2017, Comput. Secur..
[6] Ahmad-Reza Sadeghi,et al. PAtt: Physics-based Attestation of Control Systems , 2019, RAID.
[7] Nils Ole Tippenhauer,et al. HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems , 2016, CPS-SPC '16.
[8] S. Delurgio. Forecasting Principles and Applications , 1998 .
[9] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[10] Avishai Wool,et al. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems , 2013, Int. J. Crit. Infrastructure Prot..
[11] Alvaro A. Cárdenas,et al. Temporal Phase Shifts in SCADA Networks , 2018, CPS-SPC@CCS.
[12] Nejat Yumusak,et al. Year Ahead Demand Forecast of City Natural Gas Using Seasonal Time Series Methods , 2016 .
[13] Paramvir Singh,et al. A systematic review of IP traceback schemes for denial of service attacks , 2016, Comput. Secur..
[14] Bong-Han Kim,et al. Network Anomaly Detection for M-Connected SCADA Networks , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[15] Hui Liu,et al. A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).
[16] Dayu Yang,et al. Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .
[17] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[18] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[19] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[20] Nils Brede Moe,et al. Challenges in IT security preparedness exercises: A case study , 2017, Comput. Secur..
[21] Evi Nemeth,et al. Spectroscopy of private DNS update sources , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.
[22] D. Prince Winston,et al. An enhanced optimization based algorithm for intrusion detection in SCADA network , 2017, Comput. Secur..
[23] Yuval Shavitt,et al. Inferring the periodicity in large-scale Internet measurements , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Marko Schuba,et al. Intrusion Detection of the ICS Protocol EtherCAT , 2017 .
[25] Hideki Kawahara,et al. YIN, a fundamental frequency estimator for speech and music. , 2002, The Journal of the Acoustical Society of America.
[26] Aiko Pras,et al. Flow whitelisting in SCADA networks , 2013, Int. J. Crit. Infrastructure Prot..
[27] Ragnar Schierholz,et al. Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.
[28] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[29] Ahmad-Reza Sadeghi,et al. State-aware anomaly detection for industrial control systems , 2018, SAC.
[30] Federica Pascucci,et al. Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator , 2017, ITASEC.
[31] Yang Fu,et al. Short-term wind power forecasts by a synthetical similar time series data mining method , 2018 .
[32] Shi Yu-hao. The Application of Neural Networks In Intrusion Detection , 2012 .
[33] Kevser Ovaz Akpinar,et al. Development of the ECAT Preprocessor with the Trust Communication Approach , 2018, Secur. Commun. Networks.
[34] Khaled Salah,et al. A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).
[35] Peidong Zhu,et al. Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[36] Ibrahim Ozcelik,et al. Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection , 2019, IEEE Access.
[37] Nils Ole Tippenhauer,et al. Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures , 2019, ARES.
[38] Simin Nadjm-Tehrani,et al. Timing-Based Anomaly Detection in SCADA Networks , 2017, CRITIS.
[39] José M. Fernandez,et al. Survey of publicly available reports on advanced persistent threat actors , 2018, Comput. Secur..