2013
DOI: 10.1007/978-3-642-41476-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation

Abstract: Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastructure. Such systems are subject to sophisticated attacks by subverted processes which can manipulate message content or forge authentic messages, undermining the action of the plant, whilst hiding the effects from operators. In this paper, we propose a novel network protocol which, using techniques related to IP Traceback, enables the efficient discovery of subverted nodes, assuming an initial detection event. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The π-Calculus provides a formal mechanism for modeling process actions [7][8][9]12]. The associated algebraic theory facilitates formal reasoning, including automating proofs [12].…”
Section: G{π}-calculusmentioning
confidence: 99%
See 2 more Smart Citations
“…The π-Calculus provides a formal mechanism for modeling process actions [7][8][9]12]. The associated algebraic theory facilitates formal reasoning, including automating proofs [12].…”
Section: G{π}-calculusmentioning
confidence: 99%
“…For the defense strategy, an operator employs observer agents for state determination and trusted routes for alerts regarding critical conditions. As described in [8,9,13], each network node that receives a message adds its address…”
Section: Distributed Detectionmentioning
confidence: 99%
See 1 more Smart Citation