2014
DOI: 10.1155/2014/597697
|View full text |Cite
|
Sign up to set email alerts
|

Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

Abstract: Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA) sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is importa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 18 publications
(16 reference statements)
0
4
0
Order By: Relevance
“…Eventually, the direction of the stated technological improvements led the industry to form an automation system that communicates using Ethernet or Ethernet-based protocols, contains configured IT services (web, ftp, mail, etc. ), integrates with TCP/IP infrastructure, and is monitored/controlled through SCADA software [2]. Thus, even a terminal device in the field can be controlled directly or indirectly via Ethernet.…”
Section: Introductionmentioning
confidence: 99%
“…Eventually, the direction of the stated technological improvements led the industry to form an automation system that communicates using Ethernet or Ethernet-based protocols, contains configured IT services (web, ftp, mail, etc. ), integrates with TCP/IP infrastructure, and is monitored/controlled through SCADA software [2]. Thus, even a terminal device in the field can be controlled directly or indirectly via Ethernet.…”
Section: Introductionmentioning
confidence: 99%
“…A DFA is described by five components [25], denoted by a set of five symbols called 5-tuples (Q, ∑, δ, q 0 , F).…”
Section: Deterministic Finite Automatonmentioning
confidence: 99%
“…The work of Kang [100] demonstrated a number of techniques for preventing infected traffic from attacking SCADA protocols. Dubbed the IndusCAP-Gate system, it automatically generates whitelists by analyzing traffic and performing multiple filtering based up said lists for blocking suspected traffic [100]. Multiple filters are a series of four filters for analyzing data packets, checking policy adherence in the packets and access control.…”
Section: Industrial Protocol Filtersmentioning
confidence: 99%