Verba et al., 2008 - Google Patents
Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS)Verba et al., 2008
View PDF- Document ID
- 13251738847986609332
- Author
- Verba J
- Milvich M
- Publication year
- Publication venue
- 2008 IEEE Conference on Technologies for Homeland Security
External Links
Snippet
Current intrusion detection system (IDS) technology is not suited to be widely deployed inside a supervisory, control and data acquisition (SCADA) environment. Anomaly-and signature-based IDS technologies have developed methods to cover information technology …
- 238000001514 detection method 0 title abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Verba et al. | Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS) | |
| EP2555486B1 (en) | Multi-method gateway-based network security systems and methods | |
| US7409714B2 (en) | Virtual intrusion detection system and method of using same | |
| US7207061B2 (en) | State machine for accessing a stealth firewall | |
| US12218937B2 (en) | Packet processing method and apparatus, device, and computer-readable storage medium | |
| WO2015107861A1 (en) | Information processing device, illicit activity determination method, illicit activity determination program, information processing device, activity determination method, and activity determination program | |
| KR100947211B1 (en) | Active Security Audit System | |
| Lin et al. | Implementation of an SDN-based security defense mechanism against DDoS attacks | |
| US10630708B2 (en) | Embedded device and method of processing network communication data | |
| Žagar et al. | Security aspects in IPv6 networks–implementation and testing | |
| Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
| Scarfone et al. | Intrusion detection and prevention systems | |
| CN113411296B (en) | Situation awareness virtual link defense method, device and system | |
| Patel et al. | A snort-based secure edge router for smart home | |
| US20190357052A1 (en) | System and method for analyzing properties within a real time or recorded transmissions | |
| RU2703329C1 (en) | Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them | |
| Ponomarev | Intrusion Detection System of industrial control networks using network telemetry | |
| Resmi et al. | Intrusion detection system techniques and tools: A survey | |
| Rai et al. | Intrusion detection systems: A review | |
| Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
| KR20200044210A (en) | Abnormal behavior packet detector for wireless IoT device | |
| Holik | Protecting IoT Devices with Software-Defined Networks | |
| KR101177704B1 (en) | Method, terminal, and computer-readable recording medium for blocking harmful url | |
| Venuti et al. | Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment |