2007 IEEE Conference on Emerging Technologies &Amp; Factory Automation (EFTA 2007) 2007
DOI: 10.1109/efta.2007.4416847
|View full text |Cite
|
Sign up to set email alerts
|

Using a packet manipulation tool for security analysis of industrial network protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 3 publications
0
7
0
1
Order By: Relevance
“…We captured three days of network traffic: 2-day data were used to construct the user behavior model, and 1-day data was used for testing. Because the BUCT dataset does not consist of anomaly traffic, we used the Scapy [27] to generate SYN-flood attacks traffic for the BUCT dataset. The Scapy is a powerful Python-based interactive packet manipulation program and library.…”
Section: Datasetsmentioning
confidence: 99%
“…We captured three days of network traffic: 2-day data were used to construct the user behavior model, and 1-day data was used for testing. Because the BUCT dataset does not consist of anomaly traffic, we used the Scapy [27] to generate SYN-flood attacks traffic for the BUCT dataset. The Scapy is a powerful Python-based interactive packet manipulation program and library.…”
Section: Datasetsmentioning
confidence: 99%
“…Their security framework consists of four components, namely monitoring, anomaly detection, impact analysis and mitigation strategies. Similarly, packet manipulation software Scapy is used in [5] to perform vulnerability testing on Modbus/TCP. Cyber security issues and access points in a substation have been highlighted in [3] and [9].…”
Section: Related Workmentioning
confidence: 99%
“…This is partly caused by the sensitivity of the data. In fact, publications on SCADA networks generally do not rely on empirical data as obtained from real-world measurement [1,2,3]. In contrast, traditional networks have been intensively studied, sometimes leading to surprising insights.…”
Section: Introductionmentioning
confidence: 99%