[go: up one dir, main page]

Verba et al., 2008 - Google Patents

Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS)

Verba et al., 2008

View PDF
Document ID
13251738847986609332
Author
Verba J
Milvich M
Publication year
Publication venue
2008 IEEE Conference on Technologies for Homeland Security

External Links

Snippet

Current intrusion detection system (IDS) technology is not suited to be widely deployed inside a supervisory, control and data acquisition (SCADA) environment. Anomaly-and signature-based IDS technologies have developed methods to cover information technology …
Continue reading at www.osti.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Similar Documents

Publication Publication Date Title
Verba et al. Idaho national laboratory supervisory control and data acquisition intrusion detection system (SCADA IDS)
EP2555486B1 (en) Multi-method gateway-based network security systems and methods
US7409714B2 (en) Virtual intrusion detection system and method of using same
US7207061B2 (en) State machine for accessing a stealth firewall
US12218937B2 (en) Packet processing method and apparatus, device, and computer-readable storage medium
WO2015107861A1 (en) Information processing device, illicit activity determination method, illicit activity determination program, information processing device, activity determination method, and activity determination program
KR100947211B1 (en) Active Security Audit System
Lin et al. Implementation of an SDN-based security defense mechanism against DDoS attacks
US10630708B2 (en) Embedded device and method of processing network communication data
Žagar et al. Security aspects in IPv6 networks–implementation and testing
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Scarfone et al. Intrusion detection and prevention systems
CN113411296B (en) Situation awareness virtual link defense method, device and system
Patel et al. A snort-based secure edge router for smart home
US20190357052A1 (en) System and method for analyzing properties within a real time or recorded transmissions
RU2703329C1 (en) Method of detecting unauthorized use of network devices of limited functionality from a local network and preventing distributed network attacks from them
Ponomarev Intrusion Detection System of industrial control networks using network telemetry
Resmi et al. Intrusion detection system techniques and tools: A survey
Rai et al. Intrusion detection systems: A review
Jadidoleslamy Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
KR20200044210A (en) Abnormal behavior packet detector for wireless IoT device
Holik Protecting IoT Devices with Software-Defined Networks
KR101177704B1 (en) Method, terminal, and computer-readable recording medium for blocking harmful url
Venuti et al. Deliverable DJ2. 4.1: Specification of Advanced Methods for Incident and Security Threats' Detection and Mitigation in a Multi-Domain Environment