Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

作者: Claude Fachkha , Elias Bou-Harb , Anastasis Keliris , Nasir Memon , Mustaque Ahamad

DOI: 10.14722/NDSS.2017.23149

关键词: Scale (ratio)Computer scienceDistributed computingCharacterization (materials science)InferenceThe InternetOrchestration (computing)

摘要:

参考文章(51)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
Vern Paxson, Stuart Staniford, Nicholas Weaver, Stefan Savage, Colleen Shannon, David Moore, The Spread of the Sapphire/Slammer Worm ,(2003)
Stephen McLaughlin, On dynamic malware payloads aimed at programmable logic controllers usenix conference on hot topics in security. pp. 10- 10 ,(2011)
Henrik Sandberg, K. H. Johansson, André Teixeira, On Security Indices for State Estimators in Power Networks Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010,  Stockholm, Sweden. ,(2010)
Zakir Durumeric, Michael Bailey, J Alex Halderman, None, An internet-wide view of internet-wide scanning usenix security symposium. pp. 65- 78 ,(2014)
A. Treytl, T. Sauter, C. Schwaiger, Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches international workshop on factory communication systems. pp. 201- 209 ,(2004) , 10.1109/WFCS.2004.1377709
Geoffrey M. Voelker, Stefan Savage, David Moore, Inferring internet denial-of-service activity usenix security symposium. pp. 2- 2 ,(2001)
Martin Roesch, Snort - Lightweight Intrusion Detection for Networks usenix large installation systems administration conference. pp. 229- 238 ,(1999)
M. Ford, J. Stevens, J. Ronan, Initial Results from an IPv6 Darknet13 international conference on image and signal processing. pp. 13- 13 ,(2006) , 10.1109/ICISP.2006.14
Christof Störmann, Jan Kästner, Patrick Düssel, Christian Gehl, Pavel Laskov, Jens-Uwe Bußer, Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection Critical Information Infrastructures Security. ,vol. 6027, pp. 85- 97 ,(2010) , 10.1007/978-3-642-14379-3_8