Yang et al., 2013 - Google Patents
Rule-based intrusion detection system for SCADA networksYang et al., 2013
- Document ID
- 9513587770226644958
- Author
- Yang Y
- McLaughlin K
- Littler T
- Sezer S
- Wang H
- Publication year
- Publication venue
- 2nd IET Renewable power generation conference (RPG 2013)
External Links
Snippet
Increased interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in renewable power system networks can potentially mean greater susceptibility to malicious attackers. SCADA systems have inherent cyber vulnerabilities as these systems were …
- 238000001514 detection method 0 title abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Rule-based intrusion detection system for SCADA networks | |
Yang et al. | Intrusion detection system for IEC 60870-5-104 based SCADA networks | |
US10681079B2 (en) | Method for mitigation of cyber attacks on industrial control systems | |
Yang et al. | Stateful intrusion detection for IEC 60870-5-104 SCADA security | |
CN106982235B (en) | IEC 61850-based electric power industry control network intrusion detection method and system | |
US9699204B2 (en) | Abnormal traffic detection apparatus and method based on modbus communication pattern learning | |
Yang et al. | Multiattribute SCADA-specific intrusion detection system for power networks | |
Dharma et al. | Time-based DDoS detection and mitigation for SDN controller | |
US9130983B2 (en) | Apparatus and method for detecting abnormality sign in control system | |
Kalluri et al. | Simulation and impact analysis of denial-of-service attacks on power SCADA | |
Parthasarathy et al. | Bloom filter based intrusion detection for smart grid SCADA | |
KR101388090B1 (en) | Apparatus for detecting cyber attack based on analysis of event and method thereof | |
Hasan et al. | DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments | |
Barbosa et al. | Intrusion detection in SCADA networks | |
da Silva et al. | A new methodology for real-time detection of attacks in IEC 61850-based systems | |
CN105204487A (en) | Intrusion detection method and intrusion detection system for industrial control system based on communication model | |
CN105429963A (en) | Intrusion Detection and Analysis Method Based on Modbus/Tcp | |
CN106911514A (en) | SCADA network inbreak detection methods and system based on the agreements of IEC60870 5 104 | |
Kang et al. | Cyber threats and defence approaches in SCADA systems | |
Feng et al. | Snort improvement on profinet RT for industrial control system intrusion detection | |
US9298175B2 (en) | Method for detecting abnormal traffic on control system protocol | |
Waagsnes et al. | Intrusion Detection System Test Framework for SCADA Systems. | |
Kang et al. | Whitelists based multiple filtering techniques in SCADA sensor networks | |
Kim et al. | Abnormal traffic detection mechanism for protecting IIoT environments | |
Morris et al. | A retrofit network transaction data logger and intrusion detection system for transmission and distribution substations |