Robles-Durazno et al., 2019 - Google Patents
PLC memory attack detection and response in a clean water supply systemRobles-Durazno et al., 2019
View PDF- Document ID
- 13634457102699380702
- Author
- Robles-Durazno A
- Moradpoor N
- McWhinnie J
- Russell G
- Maneru-Marin I
- Publication year
- Publication venue
- International journal of critical infrastructure protection
External Links
Snippet
Abstract Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water for granted …
- 230000015654 memory 0 title abstract description 110
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Robles-Durazno et al. | PLC memory attack detection and response in a clean water supply system | |
Tuptuk et al. | Security of smart manufacturing systems | |
Krotofil et al. | Industrial control systems security: What is happening? | |
US11689544B2 (en) | Intrusion detection via semantic fuzzing and message provenance | |
Parian et al. | Fooling the master: Exploiting weaknesses in the modbus protocol | |
Li et al. | A critical review of cyber-physical security for building automation systems | |
Rubio et al. | Analysis of Intrusion Detection Systems in Industrial Ecosystems. | |
Schmittner et al. | Security application of failure mode and effect analysis (FMEA) | |
Fovino et al. | Modbus/DNP3 state-based intrusion detection system | |
Kim et al. | STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery | |
Parthasarathy et al. | Bloom filter based intrusion detection for smart grid SCADA | |
Eigner et al. | Towards resilient artificial intelligence: Survey and research issues | |
US20170177865A1 (en) | Industrial Control System Emulator for Malware Analysis | |
EP3767913B1 (en) | Systems and methods for correlating events to detect an information security incident | |
Gönen et al. | False data injection attacks and the insider threat in smart systems | |
Ferencz et al. | Review of industry 4.0 security challenges | |
Aslam et al. | Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective | |
Liu et al. | ShadowPLCs: A novel scheme for remote detection of industrial process control attacks | |
Ovaz Akpinar et al. | Development of the ECAT preprocessor with the trust communication approach | |
Fovino | SCADA system cyber security | |
Li et al. | Network security in the industrial control system: A survey | |
Al Baalbaki et al. | Autonomic critical infrastructure protection (acip) system | |
Gulzar et al. | An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions | |
Negi et al. | Intrusion detection & prevention in programmable logic controllers: A model-driven approach | |
Mesbah et al. | Cyber threats and policies for industrial control systems |