• Skip to main content
  • Skip to primary sidebar

crackthe.net

SINCE 2010

  • Hacking
  • Security
    • Cloud Security
    • Network Security
    • OS Security
    • OT Security
    • SoC Security
    • Web Security
  • VPN
    • Filesharing
    • Streaming
  • Hosting
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Litecoin
    • Ripple
crackthe.net / Security

Security

Anomaly Detection for Industrial Control Networks using Machine Learning

Industrial Control Networks (ICN) such as Supervisory Control and Data Acquisition (SCADA) systems are widely used in industries for monitoring and controlling physical processes. These industries include power generation and supply, gas and oil production and delivery, water and waste management, telecommunication and … [Read more...] about Anomaly Detection for Industrial Control Networks using Machine Learning

An IT-Security Fuzzing Framework for Proprietary ICS Protocols

Programmable Logic Controllers are used for smart homes, in production processes or to control critical infrastructures. Modern industrial devices in the control level are often communicating over proprietary protocols on top of TCP/IP with each other and SCADA systems. The networks in which the controllers operate are … [Read more...] about An IT-Security Fuzzing Framework for Proprietary ICS Protocols

Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams

While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incor-porate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although … [Read more...] about Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams

A Public Network Trace of a Control and Automation System

The increasing number of attacks against automation systems such as SCADA and their network infrastructure have demonstrated that there is a need to secure those systems. Unfortunately, directly applying existing ICT security mechanisms to automation systems is hard due to constraints of the latter, such as … [Read more...] about A Public Network Trace of a Control and Automation System

Implementing SCADA Scenarios and Introducing Attacks

There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be … [Read more...] about Implementing SCADA Scenarios and Introducing Attacks

Two Decades of SCADA Exploitation: A Brief History

Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early … [Read more...] about Two Decades of SCADA Exploitation: A Brief History

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against … [Read more...] about SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

Man-on-the-Side Attacks (MotS) in SCADA Networks

Peter Maynard and Kieran McLaughlin describe a new class of packet injection attacks called Man-on-the-Side Attacks (MotS), previously only seen where state actors have "compromised" a number of telecommunication companies. MotS injection attacks have not been widely investigated in scientific literature, despite … [Read more...] about Man-on-the-Side Attacks (MotS) in SCADA Networks

The Future of Network Security Is In The Cloud

Digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device — not the data center. Security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift. Key … [Read more...] about The Future of Network Security Is In The Cloud

Guide to Computer Network Security Free On Springer

Guide to Computer Network Security (Fourth Edition) by Joseph Migga Kizza is free on Springer! Link: https://link.springer.com or fifth edition on https://www.amazon.com. Description This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of … [Read more...] about Guide to Computer Network Security Free On Springer

« Previous Page
Next Page »

Primary Sidebar

posts

  • Best VPN Service Provider
  • Ethical Hacking Online Courses
  • IT Security Online Courses
  • CISSP Exam Preparation
  • CEH, LPT & OSCP Exam Preparation
  • Top Ethical Hacker Forums
  • Virtual Penetration Testing Labs
  • Managed WordPress Hosting
  • Best Public Torrent Sites
  • Best Filehoster
  • Seedbox Providers
  • WordPress Security
  • Premium Proxies (HTTP/S, SOCKS4/5)
  • Top 20 Network Security Tools

contact

If you have any questions, don’t hesitate to get in touch: mail [at] crackthe.net, XING or LinkedIn. You can also follow me on Twitter.
© 2010 - 2020 crackthe.net • Site Notice • Privacy Policy