Siddharth Rao et al., 2018 - Google Patents
Impact analysis of attacks using agent-based SCADA TestbedSiddharth Rao et al., 2018
- Document ID
- 13093988545528670352
- Author
- Siddharth Rao M
- Kalluri R
- Senthil Kumar R
- Ganga Prasad G
- Bindhumadhava B
- Publication year
- Publication venue
- ISGW 2017: Compendium of Technical Papers: 3rd International Conference and Exhibition on Smart Grids and Smart Cities
External Links
Snippet
Abstract Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor the critical infrastructure such as electricity, gas, water. SCADA system networks are originally started as local control systems and have expanded to wide-area control systems …
- 238000004458 analytical method 0 title description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ahmed et al. | Scada systems: Challenges for forensic investigators | |
| Yılmaz et al. | Attack detection/prevention system against cyber attack in industrial control systems | |
| Sajid et al. | Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges | |
| Ficco et al. | Simulation platform for cyber-security and vulnerability analysis of critical infrastructures | |
| Alibasic et al. | Cybersecurity for smart cities: A brief review | |
| Sasaki et al. | Exposed infrastructures: Discovery, attacks and remediation of insecure ics remote management devices | |
| Gelenbe et al. | NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem | |
| Irfan et al. | A framework for cloud forensics evidence collection and analysis using security information and event management | |
| Annor-Asante et al. | Development of smart grid testbed with low-cost hardware and software for cybersecurity research and education | |
| Stojanović et al. | SCADA systems in the cloud and fog environments: Migration scenarios and security issues | |
| Sommestad et al. | Variables influencing the effectiveness of signature-based network intrusion detection systems | |
| Fovino et al. | Cyber security assessment of a power plant | |
| Grahn et al. | Analytics for network security: A survey and taxonomy | |
| Iqbal et al. | Digital forensic readiness in critical infrastructures: A case of substation automation in the power sector | |
| Liu et al. | Research and application of APT attack defense and detection technology based on big data technology | |
| Karacayılmaz et al. | A novel approach detection for IIoT attacks via artificial intelligence | |
| Nair et al. | The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system | |
| Kachare et al. | Sandbox environment for real time malware analysis of IoT devices | |
| Tay et al. | Taxonomy of fingerprinting techniques for evaluation of smart grid honeypot realism | |
| Wali | Analysis of security challenges in cloud-based SCADA systems: A survey | |
| Luo et al. | Federated cloud security architecture for secure and agile clouds | |
| Kaushik et al. | Big Data-Powered Analytics for Fortifying Virtualized Infrastructure Security in the Cloud | |
| Siddharth Rao et al. | Impact analysis of attacks using agent-based SCADA Testbed | |
| Gupta et al. | System cum program-wide lightweight malicious program execution detection scheme for cloud | |
| Chakraborty et al. | Next generation proactive cyber threat hunting-A complete framework |