2019
DOI: 10.1016/j.apm.2019.01.014
|View full text |Cite
|
Sign up to set email alerts
|

A propagation model with defensive measures for PLC-PC worms in industrial networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Indeed, the authors [20] pointed out that antivirus software updates always lag behind the emergence of new viruses, and it is not possible to remove all viruses from the network. In addition, our work is also different from the traditional computer virus propagation model (e.g., [21]- [26]). On the one hand, these traditional models do not consider the cloud environment.…”
Section: Introductionmentioning
confidence: 98%
“…Indeed, the authors [20] pointed out that antivirus software updates always lag behind the emergence of new viruses, and it is not possible to remove all viruses from the network. In addition, our work is also different from the traditional computer virus propagation model (e.g., [21]- [26]). On the one hand, these traditional models do not consider the cloud environment.…”
Section: Introductionmentioning
confidence: 98%
“…A programmable Logic Controller (PLC) is a type of industrial automation technology widely used in harsh operating environments because of its ability to perform reliably under extreme conditions, such as high temperatures, humidity, strong vibrations, and electrical interference [1][2][3]. PLCs are typically programmed using the IEC 61131-3 standard, which defines a set of programming languages, instructions, syntax, and semantics [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Generating reliable signatures to detect polymorphic worms is one of such means. 9,10 Signature-based detection methods are easy to implement and incorporate into firewalls, Network Intrusion Detection Systems (NIDSs) or antivirus software. At the initial stage of polymorphic worm discovery research, signatures were mostly generated by domain experts or at least with human intervention.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we need to automate the generation of signatures for newly found polymorphic worms to reduce the aforementioned time lag. Traditional automated signature generation approaches rely mainly on algorithm-generated tokens or regular expressions, 1,9,11 capturing the critical sequence segments of known polymorphic worms. Although signature-based detection methods are suited for real-time detection, most of the traditional ones fail to recognize unseen variants of polymorphic worms as they reshape themselves over each propagation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation