Inside the Closed World: User and Device Profile Analytics for SCADA Security

Attacks that use sophisticated and complex methods in-creased recently, aiming to infiltrate the Supervisory Control and Data Acquisition (SCADA) system and stay undetected. Therefore, attackers often get access to authorized permissions of SCADA and bring catastrophic damages by sending ‘legitimate...

Full description

Bibliographic Details
Main Authors: Zhou Xiaojun, Xu Zhen, Wang Liming, Chen Kai, Chen Cong, Zhang Wei
Format: Article
Language:English
Published: EDP Sciences 2018-01-01
Series:MATEC Web of Conferences
Online Access:https://doi.org/10.1051/matecconf/201817303039