2015
DOI: 10.1007/978-3-319-26567-4_4
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Message Sequences for Intrusion Detection in Industrial Control Systems

Abstract: Compared with standard information technology systems, industrial control systems show more consistent and regular communications patterns. This characteristic contributes to the stability of controlled processes in critical infrastructures such as power plants, electric grids and water treatment facilities. However, Stuxnet has demonstrated that skilled attackers can strike critical infrastructures by leveraging knowledge about these processes. Sequence attacks subvert infrastructure operations by sending mis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 11 publications
(15 reference statements)
0
25
0
Order By: Relevance
“…Sequence attacks are specific to industrial control systems and potentially harm a system by sending valid messages or commands, which are misplaced or outof-order [5]. To take control of the process, an attacker can either reprogram a PLC or directly control the process from the network, e.g., by taking control over the communication channel.…”
Section: Scada Sequence Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…Sequence attacks are specific to industrial control systems and potentially harm a system by sending valid messages or commands, which are misplaced or outof-order [5]. To take control of the process, an attacker can either reprogram a PLC or directly control the process from the network, e.g., by taking control over the communication channel.…”
Section: Scada Sequence Attacksmentioning
confidence: 99%
“…When controlling the process, an attacker sends commands in an order or timing not intended by the process. This potentially harmful sequence of commands is then called sequence attack [5].…”
Section: Scada Sequence Attacksmentioning
confidence: 99%
See 3 more Smart Citations