The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-attacks due to utilize standard protocols and increase connectivity. The purpose of this paper is to introduce our work and confirm the validity of our approach for identifying network and application protocol attacks in SCADA networks.
CITATION STYLE
Kang, D. H., Kim, B. K., Na, J. C., & Jhang, K. S. (2014). Whitelist generation technique for industrial firewall in SCADA networks. In Lecture Notes in Electrical Engineering (Vol. 301, pp. 525–534). Springer Verlag. https://doi.org/10.1007/978-94-017-8798-7_63
Mendeley helps you to discover research relevant for your work.