Whitelist generation technique for industrial firewall in SCADA networks

4Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-attacks due to utilize standard protocols and increase connectivity. The purpose of this paper is to introduce our work and confirm the validity of our approach for identifying network and application protocol attacks in SCADA networks.

Cite

CITATION STYLE

APA

Kang, D. H., Kim, B. K., Na, J. C., & Jhang, K. S. (2014). Whitelist generation technique for industrial firewall in SCADA networks. In Lecture Notes in Electrical Engineering (Vol. 301, pp. 525–534). Springer Verlag. https://doi.org/10.1007/978-94-017-8798-7_63

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free