Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Song, Joo Yeop | - |
dc.contributor.author | Lee, Woomyo | - |
dc.contributor.author | Yun, Jeong Han | - |
dc.contributor.author | Park, Hyunjae | - |
dc.contributor.author | Kim, Sin Kyu | - |
dc.contributor.author | Choi, Young June (researcherId=7406117220; isni=0000000405323933; orcid=https://orcid.org/0000-0003-2014-6587) | - |
dc.date.issued | 2018-01-01 | - |
dc.identifier.issn | 1868-4238 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36241 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85059021842&origin=inward | - |
dc.description.abstract | Industrial control systems are widely used across the critical infrastructure sectors. Anomaly-based intrusion detection is an attractive approach for identifying potential attacks that leverage industrial control systems to target critical infrastructure assets. In order to analyze the performance of an anomaly-based intrusion detection system, extensive testing should be performed by considering variations of specific cyber threat scenarios, including victims, attack timing, traffic volume and transmitted contents. However, due to security concerns and the potential impact on operations, it is very difficult, if not impossible, to collect abnormal network traffic from real-world industrial control systems. This chapter addresses the problem by proposing a method for automatically generating a variety of anomalous test traffic based on cyber threat scenarios related to industrial control systems. | - |
dc.language.iso | eng | - |
dc.publisher | Springer New York LLC | - |
dc.subject.mesh | Anomaly based intrusion detection systems | - |
dc.subject.mesh | Anomaly detection | - |
dc.subject.mesh | Anomaly-based intrusion detection | - |
dc.subject.mesh | Extensive testing | - |
dc.subject.mesh | Industrial control systems | - |
dc.subject.mesh | Industrial controls | - |
dc.subject.mesh | Intrusion Detection Systems | - |
dc.subject.mesh | Traffic generation | - |
dc.title | Generating abnormal industrial control network traffic for intrusion detection system testing | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2018.3.12. ~ 2018.3.14. | - |
dc.citation.conferenceName | 12th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2018 | - |
dc.citation.edition | 12th IFIP WG 11.10 International Conference, ICCIP 2018, Revised Selected Papers | - |
dc.citation.endPage | 281 | - |
dc.citation.startPage | 265 | - |
dc.citation.title | IFIP Advances in Information and Communication Technology | - |
dc.citation.volume | 542 | - |
dc.identifier.bibliographicCitation | IFIP Advances in Information and Communication Technology, Vol.542, pp.265-281 | - |
dc.identifier.doi | 10.1007/978-3-030-04537-1_14 | - |
dc.identifier.scopusid | 2-s2.0-85059021842 | - |
dc.identifier.url | http://www.springer.com/series/6102 | - |
dc.subject.keyword | Anomaly detection | - |
dc.subject.keyword | Industrial control systems | - |
dc.subject.keyword | Traffic generation | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Information Systems and Management | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.