2016
DOI: 10.1080/19393555.2016.1172283
|View full text |Cite
|
Sign up to set email alerts
|

On the use of open-source firewalls in ICS/SCADA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…This approach is not validated and to some extent duplicates the work of Human Machine Interfaces (HMIs) in SCADA. Moreover, the authors in Nivethan and Papa (2016b) analyze the use of open source firewalls in SCADA/ICS and propose to use iptables}for filtering SCADA traffic. Using string matching they detect, e.g., unauthorized write commands and test this approach on Modbus/TCP traffic.…”
Section: Process-aware Monitoringmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach is not validated and to some extent duplicates the work of Human Machine Interfaces (HMIs) in SCADA. Moreover, the authors in Nivethan and Papa (2016b) analyze the use of open source firewalls in SCADA/ICS and propose to use iptables}for filtering SCADA traffic. Using string matching they detect, e.g., unauthorized write commands and test this approach on Modbus/TCP traffic.…”
Section: Process-aware Monitoringmentioning
confidence: 99%
“…Related work in the field of process-aware IDS techniques distinguishes between learning-(e.g., (Caselli et al 2015;Hadžiosmanović et al 2014)) and specification-based (e.g., (Lin et al 2016;Urbina et al 2016;Koutsandria et al 2014;Nivethan and Papa 2016b;Bao et al 2016;Mashima et al 2016)) approaches. The latter then either uses static (e.g., (Nivethan and Papa 2016b)) or dynamic (e.g., (Lin et al 2016;Urbina et al 2016)) rules for detecting and/or preventing malicious commands. The specificationbased approaches are closely related to the approach presented in this paper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the first recommendation is to segment the SCADA network from the enterprise one using suitable firewalls to protect PLCs/RTUs from unauthorized requests that originate from outside the field. [12] In time-critical systems, firewalls must be carefully introduced for reducing additional packet latency. Filtering unwanted traffic by means of a firewall can increase the network performances.…”
Section: Related Workmentioning
confidence: 99%
“…One of the first recommendation is to segment the SCADA network from the enterprise one using suitable firewalls in order to protect PLCs/RTUs from unauthorized requests that originate from outside the field. [7] In time-critical systems, firewalls must be carefully introduced for reducing additional packet latency. Filtering unwanted traffic by means of a firewall can increase the network performances.…”
Section: Related Workmentioning
confidence: 99%