[HTML][HTML] Protocol study and anomaly detection for server-driven traffic in SCADA networks

CY Lin, S Nadjm-Tehrani - International Journal of Critical Infrastructure …, 2023 - Elsevier
Abstract Attacks against Supervisory Control and Data Acquisition (SCADA) systems
operating critical infrastructures have largely appeared in the past decades. There are …

Anomaly detection for SCADA system security based on unsupervised learning and function codes analysis in the DNP3 protocol

M Altaha, S Hong - Electronics, 2022 - mdpi.com
An Intrusion Detection System (IDS) is a tool used primarily for security monitoring, which is
one of the security strategies for Supervisory Control and Data Acquisition (SCADA) …

Scada world: An exploration of the diversity in power grid networks

N Ortiz, AA Cardenas, A Wool - … of the ACM on Measurement and …, 2024 - dl.acm.org
Despite a growing interest in understanding the industrial control networks that monitor and
control our critical infrastructures (such as the power grid), to date, SCADA networks have …

Understanding IEC-60870-5-104 traffic patterns in SCADA networks

CY Lin, S Nadjm-Tehrani - Proceedings of the 4th ACM Workshop on …, 2018 - dl.acm.org
The IEC-60870-5-104 (IEC-104) protocol is commonly used in Supervisory Control and Data
Acquisition (SCADA) networks to operate critical infrastructures, such as power stations. As …

Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication

V Havlena, P Matoušek, O Ryšavý… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several industry sectors, including critical infrastructure, have experienced severe cyber
attacks against their Industrial Control Systems (ICS) due to the malware that masqueraded …

[PDF][PDF] An Autoencoder-Based Network Intrusion Detection System for the SCADA System.

M Altaha, JM Lee, M Aslam, S Hong - J. Commun., 2021 - researchgate.net
 The intrusion detection system (IDS) is the main tool to do security monitoring that is one of
the security strategies for the supervisory control and data acquisition (SCADA) system. In …

A case study in power substation network dynamics

D Formby, A Walid, R Beyah - Proceedings of the ACM on Measurement …, 2017 - dl.acm.org
The modern world is becoming increasingly dependent on computing and communication
technology to function, but unfortunately its application and impact on areas such as critical …

A comparative analysis of emulated and real iec-104 spontaneous traffic in power system networks

CY Lin, S Nadjm-Tehrani - … Workshop on Cyber-Physical Security for …, 2020 - Springer
Abstract Supervisory and Data Acquisition (SCADA) systems control and monitor modern
power networks. As attacks targeting SCADA systems are increasing, significant research is …

If i knew then what i know now: On reevaluating dnp3 security using power substation traffic

C Irvene, T Shekari, D Formby, R Beyah - Proceedings of the Fifth Annual …, 2019 - dl.acm.org
In the modern world, the reliable and continuous operation of cyber-physical systems
(CPSs) have become increasingly crucial factors of our daily life. As a result, the networking …

An empirical study of TCP vulnerabilities in critical power system devices

D Formby, SS Jung, J Copeland, R Beyah - Proceedings of the 2nd …, 2014 - dl.acm.org
Implementations of the TCP/IP protocol suite have been patched for decades to reduce the
threat of TCP sequence number prediction attacks. TCP, in particular, has been adopted to …