[HTML][HTML] Protocol study and anomaly detection for server-driven traffic in SCADA networks
CY Lin, S Nadjm-Tehrani - International Journal of Critical Infrastructure …, 2023 - Elsevier
Abstract Attacks against Supervisory Control and Data Acquisition (SCADA) systems
operating critical infrastructures have largely appeared in the past decades. There are …
operating critical infrastructures have largely appeared in the past decades. There are …
Anomaly detection for SCADA system security based on unsupervised learning and function codes analysis in the DNP3 protocol
M Altaha, S Hong - Electronics, 2022 - mdpi.com
An Intrusion Detection System (IDS) is a tool used primarily for security monitoring, which is
one of the security strategies for Supervisory Control and Data Acquisition (SCADA) …
one of the security strategies for Supervisory Control and Data Acquisition (SCADA) …
Scada world: An exploration of the diversity in power grid networks
Despite a growing interest in understanding the industrial control networks that monitor and
control our critical infrastructures (such as the power grid), to date, SCADA networks have …
control our critical infrastructures (such as the power grid), to date, SCADA networks have …
Understanding IEC-60870-5-104 traffic patterns in SCADA networks
CY Lin, S Nadjm-Tehrani - Proceedings of the 4th ACM Workshop on …, 2018 - dl.acm.org
The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …
Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication
Several industry sectors, including critical infrastructure, have experienced severe cyber
attacks against their Industrial Control Systems (ICS) due to the malware that masqueraded …
attacks against their Industrial Control Systems (ICS) due to the malware that masqueraded …
[PDF][PDF] An Autoencoder-Based Network Intrusion Detection System for the SCADA System.
The intrusion detection system (IDS) is the main tool to do security monitoring that is one of
the security strategies for the supervisory control and data acquisition (SCADA) system. In …
the security strategies for the supervisory control and data acquisition (SCADA) system. In …
A case study in power substation network dynamics
The modern world is becoming increasingly dependent on computing and communication
technology to function, but unfortunately its application and impact on areas such as critical …
technology to function, but unfortunately its application and impact on areas such as critical …
A comparative analysis of emulated and real iec-104 spontaneous traffic in power system networks
CY Lin, S Nadjm-Tehrani - … Workshop on Cyber-Physical Security for …, 2020 - Springer
Abstract Supervisory and Data Acquisition (SCADA) systems control and monitor modern
power networks. As attacks targeting SCADA systems are increasing, significant research is …
power networks. As attacks targeting SCADA systems are increasing, significant research is …
If i knew then what i know now: On reevaluating dnp3 security using power substation traffic
In the modern world, the reliable and continuous operation of cyber-physical systems
(CPSs) have become increasingly crucial factors of our daily life. As a result, the networking …
(CPSs) have become increasingly crucial factors of our daily life. As a result, the networking …
An empirical study of TCP vulnerabilities in critical power system devices
Implementations of the TCP/IP protocol suite have been patched for decades to reduce the
threat of TCP sequence number prediction attacks. TCP, in particular, has been adopted to …
threat of TCP sequence number prediction attacks. TCP, in particular, has been adopted to …