2010 43rd Hawaii International Conference on System Sciences 2010
DOI: 10.1109/hicss.2010.139
|View full text |Cite
|
Sign up to set email alerts
|

Designing Secure SCADA Systems Using Security Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 6 publications
0
18
0
Order By: Relevance
“…On the subject of pattern recognition, Fernandez, E et al discuss its use for SCADA security [174]. The aim of their proposed technique is to apply a pattern to a SCADA system to identify threats that have occurred at a software level and to guide security at each stage.…”
Section: Using Behavioural Observationmentioning
confidence: 99%
“…On the subject of pattern recognition, Fernandez, E et al discuss its use for SCADA security [174]. The aim of their proposed technique is to apply a pattern to a SCADA system to identify threats that have occurred at a software level and to guide security at each stage.…”
Section: Using Behavioural Observationmentioning
confidence: 99%
“…A pattern for sensor network architecture built using the sensor node pattern as a unit is presented in [3]. The sensor node pattern is also used as a component in the SCADA pattern [7].…”
Section: J Related Patternsmentioning
confidence: 99%
“…At remote stations side; the physical attack is overcome by uses of "role-based access control or RBAC pattern with combination of authenticator and logger patterns" and authorization pattern with combination of authenticator and logger patterns used for attacks such as malicious attack field stations, wrong commands, malicious attack with runtime parameters and "firewall pattern with an intrusion detection system or IDS pattern" are used for denial of service attacks. Communication network attacks such as sniffing is handle by using cryptography solutions, spoofing and DOS by using authentication pattern message is during communication between master and remote or field station (Fernandez and Larrondo-Petrie, 2010). Several security patterns are specify for SCADA security or secure SCADA architecture and deployed in different parts of SCADA system to address the attack/threads which warm the communication.…”
Section: Scada Communication Using Security Patternsmentioning
confidence: 99%