Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3103166
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for Simulated IEC-60870-5-104 Trafiic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 5 publications
1
15
0
Order By: Relevance
“…In [108] E. Hodo et al present an anomaly-based IDS for a SCADA simulated environment which utilizes the IEC 60870-5-104 [109] (IEC-104) protocol. In 1995, the International Electromechanical Commission (IEC) was released IEC-60870-5-101 which includes essential telecontrol messages between a logic controller and a controlling server.…”
Section: Idps Systems For Scada Systemsmentioning
confidence: 99%
“…In [108] E. Hodo et al present an anomaly-based IDS for a SCADA simulated environment which utilizes the IEC 60870-5-104 [109] (IEC-104) protocol. In 1995, the International Electromechanical Commission (IEC) was released IEC-60870-5-101 which includes essential telecontrol messages between a logic controller and a controlling server.…”
Section: Idps Systems For Scada Systemsmentioning
confidence: 99%
“…IEC 60870-5-104 (also known as IEC104) is one of the IEC 60870 set of international standards released by the International Electrotechnical Commission (IEC). The IEC 60870 standard defines systems used for tele-control in electrical engineering and power system automation applications [7]. It specifies a communication profile for sending basic tele-control messages between two systems over standard TCP/IP network, which allows simultaneous data transmission between several devices and services.…”
Section: Iec 60870-5-104 Protocolmentioning
confidence: 99%
“…The security of IEC 104 has been proven to be problematic [5,8]. According to recent security advisories [7], multiple security weaknesses associated with this protocol have been reported [3] such as the lack of strong data encryption and proper authentication could allow an unauthenticated, remote attacker to inject, hijack or spoof network communications or exploit input validation flaws on vulnerable systems using the IEC 104 protocol [7]. Although the IEC have published a security standard, IEC 62351.…”
Section: Iec 60870-5-104 Protocolmentioning
confidence: 99%
“…The research outcome contributes towards the development of defence model against the attack. Researchers in [9] find out an anomaly on the SCADA traffic when an attack on IEC protocol occurs.…”
Section: Introductionmentioning
confidence: 99%