2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017
DOI: 10.1109/apnoms.2017.8094163
|View full text |Cite
|
Sign up to set email alerts
|

Structured whitelist generation in SCADA network using PrefixSpan algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Due to the increasing number of external threats, firewalls have recently tended to adopt the allowlist type of rule descriptions, in which only the allow actions are listed and the default is denied. Therefore, in the real-world packet filtering, more emphasis is being placed on reordering methods for allowlist ROROs [10], [11]. In this paper, we show that the computational complexity of RORO for allowlist is NP-hard by reducing from EXACT COVER BY 3-SETS which is known as NP-hard.…”
Section: Introductionmentioning
confidence: 93%
“…Due to the increasing number of external threats, firewalls have recently tended to adopt the allowlist type of rule descriptions, in which only the allow actions are listed and the default is denied. Therefore, in the real-world packet filtering, more emphasis is being placed on reordering methods for allowlist ROROs [10], [11]. In this paper, we show that the computational complexity of RORO for allowlist is NP-hard by reducing from EXACT COVER BY 3-SETS which is known as NP-hard.…”
Section: Introductionmentioning
confidence: 93%
“…The related studies were organized based on the header field feature and the payload field feature. Anomaly detection methods based on static-rule-based [14][15][16][17][18] and modeling-based [19][20][21][22][23][24] learning of header field features have been proposed in various studies. The staticrule-based studies are similar to firewall rule generation studies in the IT network environment.…”
Section: Related Workmentioning
confidence: 99%
“…Wong [15] proposed a signature-based IDS for the EtherNet/IP protocol and integrated it into Suricata, an open-source IDS tool. Yun [16] proposed a whitelist generation method for traffic patterns based on the header information of a packet using each command. Nivethan [17] and Li [18] focused on detailed protocol fields for firewall rule generation.…”
Section: Related Workmentioning
confidence: 99%
“…Jung et al [41] proposed whitelist for SCADA traffic using repetitive communication characteristics of the SCADA system. Kang et al [42] developed techniques for preparation of whitelist for firewall of SCADA traffic.…”
Section: Existing Related Workmentioning
confidence: 99%