Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network

[1]  Aiko Pras,et al.  Exploiting traffic periodicity in industrial control networks , 2016, Int. J. Crit. Infrastructure Prot..

[2]  Aiko Pras,et al.  Towards periodicity based anomaly detection in SCADA networks , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).

[3]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[4]  Rayford B. Vaughn,et al.  Deterministic Intrusion Detection Rules for MODBUS Protocols , 2013, 2013 46th Hawaii International Conference on System Sciences.

[5]  Babu M. Mehtre,et al.  Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks , 2017, Comput. Secur..

[6]  Ahmad-Reza Sadeghi,et al.  PAtt: Physics-based Attestation of Control Systems , 2019, RAID.

[7]  Nils Ole Tippenhauer,et al.  HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems , 2016, CPS-SPC '16.

[8]  S. Delurgio Forecasting Principles and Applications , 1998 .

[9]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[10]  Avishai Wool,et al.  Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems , 2013, Int. J. Crit. Infrastructure Prot..

[11]  Alvaro A. Cárdenas,et al.  Temporal Phase Shifts in SCADA Networks , 2018, CPS-SPC@CCS.

[12]  Nejat Yumusak,et al.  Year Ahead Demand Forecast of City Natural Gas Using Seasonal Time Series Methods , 2016 .

[13]  Paramvir Singh,et al.  A systematic review of IP traceback schemes for denial of service attacks , 2016, Comput. Secur..

[14]  Bong-Han Kim,et al.  Network Anomaly Detection for M-Connected SCADA Networks , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[15]  Hui Liu,et al.  A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[16]  Dayu Yang,et al.  Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .

[17]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[18]  Milos Manic,et al.  Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.

[19]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[20]  Nils Brede Moe,et al.  Challenges in IT security preparedness exercises: A case study , 2017, Comput. Secur..

[21]  Evi Nemeth,et al.  Spectroscopy of private DNS update sources , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[22]  D. Prince Winston,et al.  An enhanced optimization based algorithm for intrusion detection in SCADA network , 2017, Comput. Secur..

[23]  Yuval Shavitt,et al.  Inferring the periodicity in large-scale Internet measurements , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Marko Schuba,et al.  Intrusion Detection of the ICS Protocol EtherCAT , 2017 .

[25]  Hideki Kawahara,et al.  YIN, a fundamental frequency estimator for speech and music. , 2002, The Journal of the Acoustical Society of America.

[26]  Aiko Pras,et al.  Flow whitelisting in SCADA networks , 2013, Int. J. Crit. Infrastructure Prot..

[27]  Ragnar Schierholz,et al.  Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration , 2009, 2009 IEEE Conference on Emerging Technologies & Factory Automation.

[28]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[29]  Ahmad-Reza Sadeghi,et al.  State-aware anomaly detection for industrial control systems , 2018, SAC.

[30]  Federica Pascucci,et al.  Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator , 2017, ITASEC.

[31]  Yang Fu,et al.  Short-term wind power forecasts by a synthetical similar time series data mining method , 2018 .

[32]  Shi Yu-hao The Application of Neural Networks In Intrusion Detection , 2012 .

[33]  Kevser Ovaz Akpinar,et al.  Development of the ECAT Preprocessor with the Trust Communication Approach , 2018, Secur. Commun. Networks.

[34]  Khaled Salah,et al.  A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).

[35]  Peidong Zhu,et al.  Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[36]  Ibrahim Ozcelik,et al.  Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection , 2019, IEEE Access.

[37]  Nils Ole Tippenhauer,et al.  Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures , 2019, ARES.

[38]  Simin Nadjm-Tehrani,et al.  Timing-Based Anomaly Detection in SCADA Networks , 2017, CRITIS.

[39]  José M. Fernandez,et al.  Survey of publicly available reports on advanced persistent threat actors , 2018, Comput. Secur..