[go: up one dir, main page]

Robles-Durazno et al., 2019 - Google Patents

PLC memory attack detection and response in a clean water supply system

Robles-Durazno et al., 2019

View PDF
Document ID
13634457102699380702
Author
Robles-Durazno A
Moradpoor N
McWhinnie J
Russell G
Maneru-Marin I
Publication year
Publication venue
International journal of critical infrastructure protection

External Links

Snippet

Abstract Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens tend to take modern-day conveniences such as trains, planes or tap water for granted …
Continue reading at napier-repository.worktribe.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Similar Documents

Publication Publication Date Title
Robles-Durazno et al. PLC memory attack detection and response in a clean water supply system
Tuptuk et al. Security of smart manufacturing systems
Krotofil et al. Industrial control systems security: What is happening?
US11689544B2 (en) Intrusion detection via semantic fuzzing and message provenance
Parian et al. Fooling the master: Exploiting weaknesses in the modbus protocol
Li et al. A critical review of cyber-physical security for building automation systems
Rubio et al. Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Schmittner et al. Security application of failure mode and effect analysis (FMEA)
Fovino et al. Modbus/DNP3 state-based intrusion detection system
Kim et al. STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery
Parthasarathy et al. Bloom filter based intrusion detection for smart grid SCADA
Eigner et al. Towards resilient artificial intelligence: Survey and research issues
US20170177865A1 (en) Industrial Control System Emulator for Malware Analysis
EP3767913B1 (en) Systems and methods for correlating events to detect an information security incident
Gönen et al. False data injection attacks and the insider threat in smart systems
Ferencz et al. Review of industry 4.0 security challenges
Aslam et al. Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective
Liu et al. ShadowPLCs: A novel scheme for remote detection of industrial process control attacks
Ovaz Akpinar et al. Development of the ECAT preprocessor with the trust communication approach
Fovino SCADA system cyber security
Li et al. Network security in the industrial control system: A survey
Al Baalbaki et al. Autonomic critical infrastructure protection (acip) system
Gulzar et al. An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions
Negi et al. Intrusion detection & prevention in programmable logic controllers: A model-driven approach
Mesbah et al. Cyber threats and policies for industrial control systems