Inside the Closed World: User and Device Profile Analytics for SCADA Security
Attacks that use sophisticated and complex methods in-creased recently, aiming to infiltrate the Supervisory Control and Data Acquisition (SCADA) system and stay undetected. Therefore, attackers often get access to authorized permissions of SCADA and bring catastrophic damages by sending ‘legitimate...
Main Authors: | Zhou Xiaojun, Xu Zhen, Wang Liming, Chen Kai, Chen Cong, Zhang Wei |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2018-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | https://doi.org/10.1051/matecconf/201817303039 |
Similar Items
-
APT Attack Analysis in SCADA Systems
by: Zhou Xiaojun, et al.
Published: (2018-01-01) -
Behavior Based Anomaly Detection Model in SCADA System
by: Zhou Xiaojun, et al.
Published: (2018-01-01) -
Construction and Evaluation of Defense-in-Depth architecture in SCADA System
by: Zhou Xiaojun, et al.
Published: (2018-01-01) -
SCADA security device: design and implementation
by: Rodrigues, Aniket
Published: (2012) -
SCADA System Application for Residential Security
by: Yen-Hao Chen, et al.
Published: (2015)