CISUC

Improving Network Security Monitoring for Industrial Control Systems

Authors



Keywords

ICS, Monitoring

Subject

ICS, Monitoring

Conference

14th IFIP/IEEE Int. Symposium on Integrated Management (IM 2015), May 2015

DOI


Cited by

Year 2020 : 2 citations

 Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang, PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints, Computers & Security, Volume 92, 2020, 101749, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101749.

 Pranshu Bajpai, Richard Enbody, and Betty H.C. Cheng. 2020. Ransomware Targeting Automobiles. In Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security (AutoSec ’20). Association for Computing Machinery, New York, NY, USA, 23–29. DOI:https://doi.org/10.1145/3375706.3380558

Year 2019 : 6 citations

 Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306

 T. Abdelghani, "Industrial control systems (ics) security in power transmission network," 2019 Algerian Large Electrical Network Conference (CAGRE), Algiers, Algeria, 2019, pp. 1-4. DOI: 10.1109/CAGRE.2019.8713289

 D. Zegzhda, D. Lavrova, and M. Poltavtseva, "Multifractal Security Analysis of Cyberphysical Systems", in NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, Vol.22, No.2, pp.196 - 204, 2019.

 Khaoula Es-Salhi. Segmentation and segregation mechanisms and models to secure the integration of Industrial control Systems (ICS) with corporate system. Systems and Control [cs.SY]. Ecole nationale supérieure Mines-Télécom Atlantique, 2019. English. ffNNT : 2019IMTA0143ff. fftel-02298847f. URL: https://tel.archives-ouvertes.fr/tel-02298847/document

 Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally, Cybersecurity in industrial control systems: Issues, technologies, and challenges, Computer Networks, Volume 165, 2019, ISSN 1389-1286. DOI: 10.1016/j.comnet.2019.106946.

 H. Gao, J. Li and J. Cheng, "Industrial Control Network Security Analysis and Decision-Making by Reasoning Method Based on Strong Relevant Logic," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 289-294.
doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00060

Year 2018 : 6 citations

 Yau K., Chow KP., Yiu SM. (2018) A Forensic Logging System for Siemens Programmable Logic Controllers. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology, vol 532. Springer, Cham. DOI: 10.1007/978-3-319-99277-8_18

 P. Palaniswamy and B. McMillin, "Cyber-Physical Security of an Electric Microgrid," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 74-83. doi: 10.1109/PRDC.2018.00018

 S. S. Patlolla, B. McMillin, S. Adepu and A. Mathur, "An Approach for Formal Analysis of the Security of a Water Treatment Testbed," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 115-124. doi: 10.1109/PRDC.2018.00022

 Julius C AgumaBruce McMillin, "Introduction of a Hybrid Monitor to Cyber-Physical Systems", May 2018. arXiv:1805.01975

 T. Terzimehic, S. Voss and M. Wenger, "Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems," 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), Munich, Germany, 2018, pp. 881-886. DOI: 10.1109/COASE.2018.8560591.

 Patlolla, Sai Sidharth, "An approach for formal analysis of the security of a water treatment testbed" (2018). Master's Thesis, Missouri University of Science and Technology. http://scholarsmine.mst.edu/masters_theses/7778

Year 2017 : 8 citations

 Palavicini Jr G., Bryan J., Sheets E., Kline M. and San Miguel J. (2017). Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting.In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, ISBN 978-989-758-245-5, pages 470-477. Jan 2017, Porto, Portugal. DOI: 10.5220/0006393704700477

 Stergiou, C., Psannis, K., Plageras, A., Kokkonis, G., Ishibashi, Y, "Architecture for security monitoring in IoT environments", in Proc. of 26th IEEE International Symposium on Industrial Electronics, 19-21 June 2017 Edinburgh, Scotland, UK, At Edinburgh, Scotland, UK.

 P. R. Dunaka and B. McMillin, "Cyber-Physical Security of a Chemical Plant," 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), Singapore, 2017, pp. 33-40. doi: 10.1109/HASE.2017.23

 Eden, Peter and Blyth, Andrew and Jones, Kevin and Soulsby, Hugh and Burnap, Pete and Cherdantseva, Yulia and Stoddart, Kristan, "SCADA System Forensic Analysis Within IIoT", in Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, pp73-101, ed. Thames, Lane and Schaefer, Dirk, Springer International Publishing, April 2017.. doi:10.1007/978-3-319-50660-9_4.

 A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, Fourthquarter 2017. doi: 10.1109/COMST.2017.2736886

 Dunaka, Prakash Rao, "Cyber-physical security of a chemical plant" (2017). M.Sc. Thesis in Computer Science, Missouri University of Science an Technology. Available at: http://scholarsmine.mst.edu/masters_theses/7638

 Korkmaz E., Davis M., Dolgikh A., Skormin V. (2017) Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. In: Rak J., Bay J., Kotenko I., Popyack L., Skormin V., Szczypiorski K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science, vol 10446. Springer, DOI: 10.1007/978-3-319-65127-9_6

 Romero-Mariona J. et al. (2017) An Approach to Organizational Cybersecurity. In: Chang V., Ramachandran M., Walters R., Wills G. (eds) Enterprise Security. Lecture Notes in Computer Science, vol 10131. Springer, Cham, DOI: 10.1007/978-3-319-54380-2_9

Year 2016 : 2 citations

 Hallman, R., Kerr, L., et al., "TMT: Technology Matching Tool for SCADA Network Security", in Proc. of Cybersecurity Symposium 2016, Coeur d’Alene, Idaho, 18-20 April 2016, pp. 38-43. DOI: 10.1109/CYBERSEC.2016.014

 Daniel Cunningham, Geancarlo Palavicini Jr., Jose Romero-Mariona, Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems, Proceedings of the AIAA/USU Conference on Small Satellites, SSC16-IV-6, 2016. http://digitalcommons.usu.edu/smallsat/2016/TS4AdvTech1/6/

Year 2015 : 1 citations

 P. Eden, A. Blyth, P. Burnap, K. Jones & K. Stoddart, “A Forensic Taxonomy of SCADA Systems and Approach to Incident Response“, Proc. of the 3rd Int. Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015), 17-18 Sept. 2015, University of Applied Sciences Ingolstadt, Germany, DOI: 10.14236/ewic/ICS2015.5.