2015
DOI: 10.1007/978-3-319-26567-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Control System Fingerprinting and Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Specifically, we use Siemens S7-300 and Allen-Bradley ControlLogix 1756-L71 (AB CLX) PLCs. Alternative PLC models could be included in future work by extending the functionality of PLCPrint to additional open-source PLC communication libraries implemented for protocols used by alternative leading PLC vendors, including Schneider Electric (Modbus-TCP) 4 , General Electric 5 , and Mitsubishi (MELSEC) 6 . Such libraries can be used to read PLC registers and acquire various memory artefacts.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, we use Siemens S7-300 and Allen-Bradley ControlLogix 1756-L71 (AB CLX) PLCs. Alternative PLC models could be included in future work by extending the functionality of PLCPrint to additional open-source PLC communication libraries implemented for protocols used by alternative leading PLC vendors, including Schneider Electric (Modbus-TCP) 4 , General Electric 5 , and Mitsubishi (MELSEC) 6 . Such libraries can be used to read PLC registers and acquire various memory artefacts.…”
Section: Discussionmentioning
confidence: 99%
“…A range of different data artefacts have been used as properties of ICS fingerprinting approaches. Several previous studies have used characteristics of ICS network data in fingerprinting methods for anomaly detection [6], [7], [16], [17], [19]. As ICS network traffic is primarily deterministic, models of normal system behaviour are able to be accurately generated in comparison to generic IT systems, where there would typically be a greater amount of noise in the network data [23].…”
Section: Fingerprinting Data Artefactsmentioning
confidence: 99%
“…Peng et al (15) give an overview of anomaly detection approaches for identifying fingerprinting attacks on industrial control systems. Further, they demonstrated how to increase security for these systems and also listed various attacks for CPSs.…”
Section: Related Workmentioning
confidence: 99%