[go: up one dir, main page]

Thomas, 2024 - Google Patents

The Next Threat Landscape: Securing America's Cyber-Physical Systems

Thomas, 2024

View PDF
Document ID
10661648521588611549
Author
Thomas G
Publication year

External Links

Snippet

The goal of this research is to explore, identify, and enumerate the security threats that exist to industry current industrial controls systems (ICS) and supervisory control and data acquisition systems (SCADA). A scale lab similar to industry standard will be built and …
Continue reading at digitalcommons.murraystate.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
AU2019268206B2 (en) Mission-based, game-implemented cyber training system and method
Buza et al. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot
US8671224B2 (en) Computer network defense
Urias et al. Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed
KR101460589B1 (en) Server for controlling simulation training in cyber warfare
Babay et al. Deploying intrusion-tolerant scada for the power grid
Bodenheim Impact of the Shodan computer search engine on internet-facing industrial control system devices
Rahman et al. Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms
Rosa et al. Attacking SCADA systems: A practical perspective
US11061792B2 (en) Test system for testing a computer of a computer system in a test network
Krishnan et al. SCADA testbed for vulnerability assessments, penetration testing and incident forensics
Ramirez et al. PLC cyber-security challenges in industrial networks
Ramachandruni et al. Detecting the network attack vectors on SCADA systems
Haney et al. A framework for the design and deployment of a scada honeynet
Olajide Developing a state of the art methodology & toolkit for ICS SCADA forensics
Ameen et al. Design and implementation of e-laboratory for information security training
Thomas The Next Threat Landscape: Securing America’s Cyber-Physical Systems
Elgh Comparison of adversary emulation tools for reproducing behavior in cyber attacks
Savaglia et al. CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.
Mayorga et al. Honeypot network configuration through cyberattack patterns
Saunders et al. Space Cybersecurity Incident Response Framework: A Viasat Case Study
Van Leeuwen et al. Empirical assessment of network-based moving target defense approaches
Hinov et al. Identification, Vulnerability Research and Cybersecurity of Raspberry Pi Devices
Culler Does practice make perfect? Lessons learned from full-scale power system incident response exercise
Kaur et al. Study of network security along with network security tools and network simulators