Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs

碩士 === 國立中興大學 === 資訊科學與工程學系所 === 107 === Industrial Control system (ICS) and Supervisory Control and Data Acquisition (SCADA) system usually do not include security design in their design phase. With the growing demands of automation and remote monitoring, ICSs become more complex and have greater i...

Full description

Bibliographic Details
Main Authors: Yu-Kuan Yeh, 葉禹寬
Other Authors: I-En Liao
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic