2008 IEEE International Conference on Emerging Technologies and Factory Automation 2008
DOI: 10.1109/etfa.2008.4638438
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-service in automation systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…To guarantee data availability and thus avoid or detect interruption threats, additional measures are necessary. A possible solution that is based on intrusion detection and isolation of the attack sources is presented in [27].…”
Section: Discussionmentioning
confidence: 99%
“…To guarantee data availability and thus avoid or detect interruption threats, additional measures are necessary. A possible solution that is based on intrusion detection and isolation of the attack sources is presented in [27].…”
Section: Discussionmentioning
confidence: 99%
“…Several publications are fully dedicated to DoS attacks at the automation and management layers [26,27,28,29,10,16,17,11,30,22]. Two main type of DoS attacks can be conducted at this layer [26]: host-based and network-based.…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…Several publications are fully dedicated to DoS attacks at the automation and management layers [26,27,28,29,10,16,17,11,30,22]. Two main type of DoS attacks can be conducted at this layer [26]: host-based and network-based. In host-based DoS, attackers target devices that are critical for the operation of the system (i.e., firewalls), devices that concentrate automation functionality (i.e., controllers), or interconnection devices (i.e., gateways, routers).…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Para combinar as vantagens de ambos os métodos, Granzer et al (2008) sugere que uma solução híbrida seja a mais apropriada para os sistemas de automação.…”
Section: Introductionunclassified