A supervisory control and data acquisition (SCADA) system may be subject to integrity attacks. Anomalies in sensor measurements may be used to detect these attacks, but such techniques do not permit us to locate attacking nodes. We propose a novel technique to enable this. Each participating network node probabilistically copies packets and marks them with routing information, before encrypting them with private keys and forwarding them to the operator. Nodes regularly release the keys used to encrypt packets. At that point, the operator may compare the copied packets with the original. Using the differences in packet content and routing information, it is possible to deduce to within one or two processes the location of an attack. Our appr...
Abstract—A method to determine entry and exit points or paths of DDoS attack traffic flows into and ...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastr...
Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation...
Despite all the increasing research efforts in industrial control systems (ICS), these systems still...
widely used for automation and control in many industry sectors, chemical plants, electric power gri...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
The goal of this master's thesis is to emulate suitable network attacks on the control communication...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
Denial of service (DoS) is a significant security threat in open networks such as the Internet. The ...
The modernization of critical infrastructure exposes a large attack surface in a set of systems, key...
For the macroscopic traceback problem, we propose an algorithm, which leverages the well-known Chand...
Abstract--This paper describes a technique for tracing anony-mous packet flooding attacks in the Int...
Abstract—Digital control systems are increasingly being deployed in critical infrastructure such as ...
Abstract—A method to determine entry and exit points or paths of DDoS attack traffic flows into and ...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Supervisory control and data acquisition (SCADA) systems form a vital part of the critical infrastr...
Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation...
Despite all the increasing research efforts in industrial control systems (ICS), these systems still...
widely used for automation and control in many industry sectors, chemical plants, electric power gri...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
The goal of this master's thesis is to emulate suitable network attacks on the control communication...
With internet expanding in every aspect of businesses infrastructure, it becomes more and more impor...
Denial of service (DoS) is a significant security threat in open networks such as the Internet. The ...
The modernization of critical infrastructure exposes a large attack surface in a set of systems, key...
For the macroscopic traceback problem, we propose an algorithm, which leverages the well-known Chand...
Abstract--This paper describes a technique for tracing anony-mous packet flooding attacks in the Int...
Abstract—Digital control systems are increasingly being deployed in critical infrastructure such as ...
Abstract—A method to determine entry and exit points or paths of DDoS attack traffic flows into and ...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...