Industrial Control Networks (ICN) such as Supervisory Control and Data Acquisition (SCADA) systems are widely used in industries for monitoring and controlling physical processes. These industries include power generation and supply, gas and oil production and delivery, water and waste management, telecommunication and … [Read more...] about Anomaly Detection for Industrial Control Networks using Machine Learning
Security
An IT-Security Fuzzing Framework for Proprietary ICS Protocols
Programmable Logic Controllers are used for smart homes, in production processes or to control critical infrastructures. Modern industrial devices in the control level are often communicating over proprietary protocols on top of TCP/IP with each other and SCADA systems. The networks in which the controllers operate are … [Read more...] about An IT-Security Fuzzing Framework for Proprietary ICS Protocols
Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams
While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incor-porate statistical fingerprinting. This is so, because datagrams in SCADA traffic follow a poison distribution. Although … [Read more...] about Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams
A Public Network Trace of a Control and Automation System
The increasing number of attacks against automation systems such as SCADA and their network infrastructure have demonstrated that there is a need to secure those systems. Unfortunately, directly applying existing ICT security mechanisms to automation systems is hard due to constraints of the latter, such as … [Read more...] about A Public Network Trace of a Control and Automation System
Implementing SCADA Scenarios and Introducing Attacks
There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be … [Read more...] about Implementing SCADA Scenarios and Introducing Attacks
Two Decades of SCADA Exploitation: A Brief History
Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early … [Read more...] about Two Decades of SCADA Exploitation: A Brief History
SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against … [Read more...] about SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach
Man-on-the-Side Attacks (MotS) in SCADA Networks
Peter Maynard and Kieran McLaughlin describe a new class of packet injection attacks called Man-on-the-Side Attacks (MotS), previously only seen where state actors have "compromised" a number of telecommunication companies. MotS injection attacks have not been widely investigated in scientific literature, despite … [Read more...] about Man-on-the-Side Attacks (MotS) in SCADA Networks
The Future of Network Security Is In The Cloud
Digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device — not the data center. Security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift. Key … [Read more...] about The Future of Network Security Is In The Cloud
Guide to Computer Network Security Free On Springer
Guide to Computer Network Security (Fourth Edition) by Joseph Migga Kizza is free on Springer! Link: https://link.springer.com or fifth edition on https://www.amazon.com. Description This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of … [Read more...] about Guide to Computer Network Security Free On Springer