2014
DOI: 10.15394/jdfsl.2014.1162
|View full text |Cite
|
Sign up to set email alerts
|

On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems

Abstract: Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks. Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services. This paper describes a set of 28 cyber attacks against industrial control systems which use the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(33 citation statements)
references
References 18 publications
0
33
0
Order By: Relevance
“…However, an urgent growing concern has emerged for protecting control systems against attacks launched in cyberspace. To detect such attacks, one can rely on the profile of anomaly patterns [30]- [33]. As an example, Carcano et al [30] proposed an intrusion detection method for SCADA system based on tracking the so-called critical states that correspond to dangerous or unwanted situations in the monitored system.…”
Section: Related Workmentioning
confidence: 99%
“…However, an urgent growing concern has emerged for protecting control systems against attacks launched in cyberspace. To detect such attacks, one can rely on the profile of anomaly patterns [30]- [33]. As an example, Carcano et al [30] proposed an intrusion detection method for SCADA system based on tracking the so-called critical states that correspond to dangerous or unwanted situations in the monitored system.…”
Section: Related Workmentioning
confidence: 99%
“…A summary of the related work is listed in Table 1. There are reviews addressing the chal- Scientific Work Reviews [19,27] Graph-based methods [2,12,13,36,37,41,42] Graph-based and time-sensitive methods [1,45] Machine learning-based [6,14,32] Statistical processes [33,44,48,50] Wavelet analysis [25,31,35] Industrial Intrusion Detection [3,15,18,20,23,28,34,38,39,46] lenge of anomaly detection for intrusion detection. García-Teodoro et al address the challenges of this field of work while presenting techniques and systems [19].…”
Section: Related Workmentioning
confidence: 99%
“…One-Class Support Vector Machine (OCSVM) as a machine learning algorithm to detect novel and unknown attacks is presented by Maglaras and Jiang [23]. Approaches to detect attacks in Modbus data with the help of signatures is presented by Gao and Morris [12]. The security of future industrial applications with the integration of the IIoT is addressed by Plaga et al [28,29].…”
Section: Related Workmentioning
confidence: 99%