2016 IEEE Symposium on Technologies for Homeland Security (HST) 2016
DOI: 10.1109/ths.2016.7568963
|View full text |Cite
|
Sign up to set email alerts
|

A Linux-based firewall for the DNP3 protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 2 publications
0
12
0
Order By: Relevance
“…Nivethan and Papa [126] presented an extension of Linuxbased firewalls for securing DNP3-based infrastructures. The proposed scheme uses the iptables tool [127] in order to inspect the payload of a DNP3 message and identify suspicious DNP3 commands.…”
Section: Dnpmentioning
confidence: 99%
“…Nivethan and Papa [126] presented an extension of Linuxbased firewalls for securing DNP3-based infrastructures. The proposed scheme uses the iptables tool [127] in order to inspect the payload of a DNP3 message and identify suspicious DNP3 commands.…”
Section: Dnpmentioning
confidence: 99%
“…The related studies were organized based on the header field feature and the payload field feature. Anomaly detection methods based on static-rule-based [14][15][16][17][18] and modeling-based [19][20][21][22][23][24] learning of header field features have been proposed in various studies. The staticrule-based studies are similar to firewall rule generation studies in the IT network environment.…”
Section: Related Workmentioning
confidence: 99%
“…Yun [16] proposed a whitelist generation method for traffic patterns based on the header information of a packet using each command. Nivethan [17] and Li [18] focused on detailed protocol fields for firewall rule generation. Studies regarding modeling-and statistics-based anomaly detection often involve command codes, address values, or transaction identification (ID) of CPIS header fields.…”
Section: Related Workmentioning
confidence: 99%
“…A number of industrial control systems still use the DNP3 protocol but do not support security functions. To detect attacks targeting the DNP3 protocol, many studies [1]- [5] have been conducted.…”
Section: Dnp3 Protocol and Its Securitymentioning
confidence: 99%
“…H. Lin et al [3] conducted a study to detect attacks based on the specification information of the DNP3 protocol, and Yun et al [4] conducted anomaly detection using burst-based communication patterns. J. Nivethan et al [5] described a Linux-based firewall for the DNP3 protocol, and A. Shahsavari et al [6] and H. Xu et al [7] conducted data payload analyses of smart grids. Unfortunately, all of these techniques focus on detecting attacks against data payloads and do not examine packet reassembly failures.…”
Section: Introductionmentioning
confidence: 99%