Proceedings of the Australasian Computer Science Week Multiconference 2017
DOI: 10.1145/3014812.3014883
|View full text |Cite
|
Sign up to set email alerts
|

Framework for SCADA cyber-attack dataset creation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…On the other side, regarding the validation of MENSA for anomaly classification, the Modbus/TCP cyberattacks of Table I were emulated in a safe manner, utilising Smod [47]. Regarding the DNP3 cyberattacks, the intrusion detection dataset of Rodofile et al [48] was combined with normal DNP3 network flows of the substation environment. Thus, datasets consisting of normal and malicious Modbus/TCP and DNP3 network flows were generated.…”
Section: B Datasets and Comparative Methodsmentioning
confidence: 99%
“…On the other side, regarding the validation of MENSA for anomaly classification, the Modbus/TCP cyberattacks of Table I were emulated in a safe manner, utilising Smod [47]. Regarding the DNP3 cyberattacks, the intrusion detection dataset of Rodofile et al [48] was combined with normal DNP3 network flows of the substation environment. Thus, datasets consisting of normal and malicious Modbus/TCP and DNP3 network flows were generated.…”
Section: B Datasets and Comparative Methodsmentioning
confidence: 99%
“…The DNP3 Network Flow-Based Anomaly Detection Model uses the ABOD method [44,45], thus identifying anomalous DNP3 network flows. Both models were trained, utilising normal DNP3 network flow statistics coming from a real substation environment as well as from the DNP3 intrusion detection dataset of N.Rodofile et al [46]. The evaluation analysis of these DNP3 intrusion/anomaly detection models is presented in our previous work in [41].…”
Section: Dnp3 Intrusionmentioning
confidence: 99%
“…The researchers use the attack scenario with MiTM attacker that targets the IEC 104 protocol by changing the cause of transmission (COT) value to an invalid value. The work focuses on the MiTM type of attack for changing the (COT) value, however many other attack types are carried out by other research works, such as in [9] which uses DoS Attack on IEC 104 protocol, and in [18] which uses injection and dropping attack on DNP3 protocol, researchers in [21] conduct experiments on reconnaissance, injection, masquerading, replay, and flooding attack on DNP3 protocol. In this case, the dataset used by [11] is not suitable for the use in other attack scenarios.…”
Section: Dataset Issuementioning
confidence: 99%