Security of smart manufacturing systems

Journal of Manufacturing Systems - Tập 47 - Trang 93-106 - 2018
Nilufer Tuptuk1, Stephen Hailes1
1Department of Computer Science, University College London, London, United Kingdom

Tóm tắt

Từ khóa


Tài liệu tham khảo

2017

Trade, 2014

Parliment, 2016

Research, 2016

Radvanovsky, 2015

2016

Parliment, 2016

Commission, 2017

Flechais, 2003, Bringing Security Home: a process for developing secure and usable systems, 49

Mittal, 2017, Smart manufacturing: characteristics, technologies and enabling factors, Proc Inst Mech Eng Part B J Eng Manuf, 0

Tuptuk, 2016

2014

2014

2014

2011

Roberts, 2005

2007

Antonakakis, 2017, Understanding the Mirai Botnet, 1093

2016

Kolias, 2017, DDoS in the IoT: Mirai and other Botnets, Computer, 50, 80, 10.1109/MC.2017.201

Beek, 2018

Avizienis, 2004, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans Dependable Secur Comput, 1, 11, 10.1109/TDSC.2004.2

2015

2017

Viega, 2006

Fovino, 2010, Modbus/DNP3 state-based intrusion detection system, 2010 24th IEEE international conference on advanced information networking and applications (AINA), 729, 10.1109/AINA.2010.86

2016

Burton, 2017

Page, 2017

Korkmaz, 2017, Detection and mitigation of time delay injection attacks on industrial control systems with PLCs, 62

Wang, 2017, Analysis of time delay attacks against power grid stability, 67

Tuptuk, 2015, Covert channel attacks in pervasive computing, 2015 IEEE international conference on pervasive computing and communications (PerCom), 236, 10.1109/PERCOM.2015.7146534

Bilge, 2012, Before we knew it: an empirical study of zero-day attacks in the real world, 833

Kuehn, 2014, Shifts in the cybersecurity paradigm: zero-day exploits, discourse, and emerging institutions, 63

Barreno, 2010, The security of machine learning, Mach Learn, 81, 121, 10.1007/s10994-010-5188-5

Grosse, 2016

Biggio, 2014, Security evaluation of pattern classifiers under attack, IEEE Trans Knowl Data Eng, 26, 984, 10.1109/TKDE.2013.57

Laskov, 2010, Machine learning in adversarial environments, Mach Learn, 81, 115, 10.1007/s10994-010-5207-6

Biggio, 2015, Adversarial biometric recognition: a review on biometric system security from the adversarial machine-learning perspective, IEEE Signal Process Mag, 32, 31, 10.1109/MSP.2015.2426728

Papernot, 2016

Papernot, 2016

Joy, 2011, Advances in parallel distributed computing, vol. 203, 366

Josse, 2007, Rootkit detection from outside the Matrix, J Comput Virol, 3, 113, 10.1007/s11416-007-0045-1

Bianchi, 2012, Blacksheep: detecting compromised hosts in homogeneous crowds, 341

Golovanov, 2011

2010

2016

Zetter, 2016

2016

Alex, 2017

M. Joyce (Ed.), Idebate Press, 2010.

2013

2014

Jill, 2008, Lessons learned from the Maroochy Water Breach, vol. 253, 73

Keeney, 2005

2017

2001

2013

2017

2015

2012

2010

2014

2014

Anderson, 2010, Security economics and critical national infrastructure, 55

2008

Stouffer, 2014

2011

2009

2011

2011

Piètre-Cambacédès, 2008, Cryptographic key management for SCADA systems-issues and perspectives, 156

Choi, 2010, Efficient secure group communications for SCADA, IEEE Trans Power Deliv, 25, 714, 10.1109/TPWRD.2009.2036181

Choi, 2009, Advanced key-management architecture for secure SCADA communications, IEEE Trans Power Deliv, 24, 1154, 10.1109/TPWRD.2008.2005683

Pal, 2009, Cryptographic key management for SCADA system: an architectural framework, 2009 International conference on advances in computing, control, and telecommunication technologies, 169, 10.1109/ACT.2009.51

Jiang, 2013, Robust group key management with revocation and collusion resistance for SCADA in smart grid, 2013 IEEE global communications conference (GLOBECOM), 802, 10.1109/GLOCOM.2013.6831171

Cheung, 2007, Using model-based intrusion detection for SCADA networks

Yang, 2006

Oman, 2008, Intrusion detection and event monitoring in SCADA networks, 161

Roosta, 2008, An intrusion detection system for wireless process control systems, 2008 5th IEEE international conference on mobile ad hoc and sensor systems, 866, 10.1109/MAHSS.2008.4660125

Düssel, 2010, Cyber-critical infrastructure protection using real-time payload-based anomaly detection, 85

Carcano, 2011, A multidimensional critical state analysis for detecting intrusions in SCADA systems, IEEE Trans Ind Inform, 7, 179, 10.1109/TII.2010.2099234

Hadziosmanovic, 2012, 354

Reeves, 2012, Intrusion detection for resource-constrained embedded control systems in the power grid, Int J Crit Infrastruct Prot, 5, 74, 10.1016/j.ijcip.2012.02.002

Tsang, 2005, Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction, 2005 IEEE international conference on industrial technology, 51, 10.1109/ICIT.2005.1600609

Paul, 2013, Towards the protection of industrial control systems: conclusions of a vulnerability analysis of Profinet IO, 160

Shin, 2010, An experimental study of hierarchical intrusion detection for wireless industrial sensor networks, IEEE Trans Ind Inform, 6, 744, 10.1109/TII.2010.2051556

Pan, 2015, Developing a hybrid intrusion detection system using data mining for power systems, IEEE Trans Smart Grid, 6, 3104, 10.1109/TSG.2015.2409775

Zhang, 2011, Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Trans Smart Grid, 2, 796, 10.1109/TSG.2011.2159818

Linda, 2009, Neural network based intrusion detection system for critical infrastructures, 102

Kiss, 2015, A clustering-based approach to detect cyber attacks in process control systems, 2015 IEEE 13th international conference on industrial informatics (INDIN), 142, 10.1109/INDIN.2015.7281725

Caselli, 2015, Sequence-aware intrusion detection in industrial control systems, 13

Premaratne, 2010, An intrusion detection system for IEC61850 automated substations, IEEE Trans Power Deliv, 25, 2376, 10.1109/TPWRD.2010.2050076

Kim, 2015, Detecting abnormal behavior in SCADA networks using normal traffic pattern learning, 121

Jardine, 2016, SENAMI: selective non-invasive active monitoring for ICS intrusion detection, 23

Ghaeini, 2016, HAMIDS: hierarchical monitoring intrusion detection system for industrial control systems, 103

Mrugala, 2017, Evolving attackers against wireless sensor networks using genetic programming, IET Wirel Sens Syst, 7, 113, 10.1049/iet-wss.2016.0090

Mrugala, 2016, Evolving attackers against wireless sensor networks, 107

Beautement, 2008, The compliance budget: managing security behaviour in organisations, 47

Herath, 2009, Protection motivation and deterrence: a framework for security policy compliance in organisations, Eur J Inf Syst, 18, 106, 10.1057/ejis.2009.6

2016

2016

2014

Line, 2014, Information Security Incident Management: Planning for Failure, IT Security Incident Management IT Forensics (IMF), 2014 Eighth International Conference on, 47, 10.1109/IMF.2014.10

Spyridopoulos, 2013, Incident analysis amp; digital forensics in SCADA and industrial control systems, 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, 1

Candell, 2015

Holm, 2015, A Survey of Industrial Control System Testbeds, 11