2019
DOI: 10.1016/j.cose.2018.10.002
|View full text |Cite
|
Sign up to set email alerts
|

SCADAWall: A CPI-enabled firewall model for SCADA security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…Trying to cope with data injection attacks in ICS, Wang et al [26] proposed a new method that uses a Long Short Term Memory Recurrent Neural Network (LSTM-RNN) as a temporal sequences predictor. Li et al [27] proposed a SCADA firewall model, called SCADAWall, for SCADA security. The SCADAWall model is powered by a comprehensive packet inspection (CPI) technology.…”
Section: Related Workmentioning
confidence: 99%
“…Trying to cope with data injection attacks in ICS, Wang et al [26] proposed a new method that uses a Long Short Term Memory Recurrent Neural Network (LSTM-RNN) as a temporal sequences predictor. Li et al [27] proposed a SCADA firewall model, called SCADAWall, for SCADA security. The SCADAWall model is powered by a comprehensive packet inspection (CPI) technology.…”
Section: Related Workmentioning
confidence: 99%
“…However, unlike the 2004 study, the study in Wool et al 8 doesn’t suggest that later software versions have fewer errors. Li et al 9 proposed a new Supervisory Control and Data Acquisition firewall model powered by the Comprehensive Packet Inspection (CPI) technology. This model includes a new Proprietary Industrial Protocols Extension Algorithm to extend capabilities to proprietary industrial protocol protection, and an Out-of-Sequence Detection Algorithm to detect abnormality within industrial operations.…”
Section: Research Surveys On Critical Cybersecurity Topicsmentioning
confidence: 99%
“…This incongruence is obvious with the differing mentality with regards to SCADA systems, in particular as seen by SCADA operators, the threat to safety and continuity of the process, far outweighs the application of IT security technologies [10]. The increasing interconnectivity and integration of SCADA systems has also amplified the exposure of the network to a greater number of access points, this not only provides the need for greater understanding but compounds the complexity of the environment with a greater number of subsystems that have interconnections between each other [8,9]. This further makes redundant the older security beliefs of 'air gap' or security through obscurity, and disconnection from internet.…”
Section: Common Threats and Vulnerabilitiesmentioning
confidence: 99%