Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2459982
|View full text |Cite
|
Sign up to set email alerts
|

Adapting Bro into SCADA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(18 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…Initially, it was intended for execution monitoring of security-critical programs in distributed system [10]. However, it has been applied to routing protocols such AODV [12], [13], [14] or OSLR [15], DNP3 protocol [16], [17], [18] Voice over IP [19], [20], [21] and other areas of CPS as discussed in section III. A practical experience in the use of specification-based intrusion is presented by Uppuluri and Sekar in [11].…”
Section: B Specification-based Intrusion Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…Initially, it was intended for execution monitoring of security-critical programs in distributed system [10]. However, it has been applied to routing protocols such AODV [12], [13], [14] or OSLR [15], DNP3 protocol [16], [17], [18] Voice over IP [19], [20], [21] and other areas of CPS as discussed in section III. A practical experience in the use of specification-based intrusion is presented by Uppuluri and Sekar in [11].…”
Section: B Specification-based Intrusion Detectionmentioning
confidence: 99%
“…They abstract the specific details away of the protocols to focus on the physics models of the system. Unlike them, Lin et al in [16] and [17] employ only DNP3 as specification source to extract the normal behaviour of the system. Further, Berthier and Sanders in [27] use C12.22 standard protocol specification as specification source to ensure that all violations of the specified security policy of the system will be captured.…”
Section: A Specification Sourcementioning
confidence: 99%
See 2 more Smart Citations
“…Many previous efforts have focused on the modeling and detection of malicious behavior in networks, with survey papers in several domains [1], including those tailored to cyber-physical systems [7]. Efforts have also explored the intrusion detection problem specifically within smart grid and control system networks [8]. However, often these techniques cannot be deployed in production systems due to false alarms produced by base-rate fallacies [4], [9].…”
Section: Related Workmentioning
confidence: 99%