• Skip to main content
  • Skip to primary sidebar

crackthe.net

SINCE 2010

  • Hacking
  • Security
    • Cloud Security
    • Network Security
    • OS Security
    • OT Security
    • SoC Security
    • Web Security
  • VPN
    • Filesharing
    • Streaming
  • Hosting
crackthe.net / Security / OT Security / Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams

Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams

While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incor-porate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although wrapping the SCADA traffic in a protective IPsec stream is an obvious choice, thin clients and unreliable communication channels make is less than ideal to use crypto-graphic solutions for security SCADA traffic. In this paper, we propose a smart alternative of data obfuscation in the form of Impulsive Statistical Fingerprinting (ISF). We provide important insights into our research in healthcare SCADA data security and the use of ISF. We substantiate the conversion of sensor data through the ISF into HL7 format and define policies of a seamless switch to a non HL7-based non-secure HIS to a secure HIS.

Link: https://arxiv.org/pdf/1909.11021.pdf

  • OT Security Certifications (GICSP, GRID, GCIP)
  • ATT&CK® for Industrial Control Systems (ICS)
  • Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities
  • Adversarial Attacks on Machine Learning Cybersecurity Defences in ICS
  • Cybersecurity for Industrial Control Systems: A Survey
  • Architecture and Security of SCADA Systems: A Review
  • Assessing Cyber-Physical Security in Industrial Control Systems
  • Anomaly Detection for Industrial Control Networks using Machine Learning
  • An IT-Security Fuzzing Framework for Proprietary ICS Protocols
  • A Public Network Trace of a Control and Automation System

Primary Sidebar

posts

  • Best VPN Service Provider
  • Ethical Hacking Online Courses
  • IT Security Online Courses
  • CISSP Exam Preparation
  • CEH, LPT & OSCP Exam Preparation
  • Top Ethical Hacker Forums
  • Virtual Penetration Testing Labs
  • Managed WordPress Hosting
  • Best Public Torrent Sites
  • Best Filehoster
  • Seedbox Providers
  • WordPress Security
  • Premium Proxies (HTTP/S, SOCKS4/5)
  • Top 20 Network Security Tools

contact

If you have any questions, don’t hesitate to get in touch: mail [at] crackthe.net, XING or LinkedIn. You can also follow me on Twitter.
© 2010 - 2020 crackthe.net • Site Notice • Privacy Policy