2013
DOI: 10.1016/j.ijcip.2013.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Flow whitelisting in SCADA networks

Abstract: Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. Modern SCADA networks are becoming more vulnerable to network attacks, due to the now common use of standard communication protocols and increased interconnection to corporate networks and the Internet. In this work, we propose an approach to improve the security of these networks based on flow whitelisting. A flow whitelist describes the legitimate traffic solely using four prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(57 citation statements)
references
References 7 publications
0
56
0
1
Order By: Relevance
“…Alg. 1 l. [1][2][3][4][5][6][7][8][9][10][11][12][13][14], processing its events. S2 extracts the attributes of an event and stores them in variable 'State DT M C ' (c.f.…”
Section: Representing Traffic Sequences As Dtmcsmentioning
confidence: 99%
See 2 more Smart Citations
“…Alg. 1 l. [1][2][3][4][5][6][7][8][9][10][11][12][13][14], processing its events. S2 extracts the attributes of an event and stores them in variable 'State DT M C ' (c.f.…”
Section: Representing Traffic Sequences As Dtmcsmentioning
confidence: 99%
“…6 For validation we use the same traffic capture mentioned in Section 3.3. This data was split into two parts of 5 days each.…”
Section: Validationmentioning
confidence: 99%
See 1 more Smart Citation
“…Cheung et al [7], Goldenberg et al [11] and Morris et al [14] have developed intrusion detection systems for industrial control networks that use the Modbus protocol. Barbosa et al [2] have used flow whitelists to describe legitimate traffic based on the properties of network packets. However, the research described in this chapter differs from these and other efforts in that it focuses on system-level characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…Most SCADA systems generally tend to have static topologies, a limited number of application protocols and regular communication patterns [6] [7].…”
Section: A the Scada Architecturementioning
confidence: 99%