Cited 0 time in
Anomaly Detection Based on Burst Characteristics for DNP3
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | 하기웅 | - |
| dc.contributor.author | 임대운 | - |
| dc.contributor.author | 장민호 | - |
| dc.contributor.author | 장지웅 | - |
| dc.date.accessioned | 2023-04-28T08:40:59Z | - |
| dc.date.available | 2023-04-28T08:40:59Z | - |
| dc.date.issued | 2018-07 | - |
| dc.identifier.issn | 1226-4717 | - |
| dc.identifier.issn | 2287-3880 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/9334 | - |
| dc.description.abstract | The SCADA (supervisory control and data acquisition) system has many existing security vulnerabilities because the systems are connected on network-based communications. Whereas conventional attacks concentrate on the server or master in the internet environment, direct attacks to outstations or slaves may cause significant damage in the SCADA system. If an attacker has a good knowledge of the control protocols of the SCADA system, it could attack an outstation disguised as a master. In this situation, the rule-based intrusion detection system might not be able to classify the malicious control message as intrusion because the message appears as a normal message. In this paper, an intrusion detection model based on the burst characteristics of the SCADA system with DNP3 (distributed network protocol) is proposed for outstations. Using the challenge-response authentication of the DNP3 protocol, the proposed model automatically updates a white list used to determine the control message. | - |
| dc.format.extent | 16 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | 한국통신학회 | - |
| dc.title | Anomaly Detection Based on Burst Characteristics for DNP3 | - |
| dc.title.alternative | Anomaly Detection Based on Burst Characteristics for DNP3 | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.7840/kics.2018.43.7.1084 | - |
| dc.identifier.bibliographicCitation | 한국통신학회논문지, v.43, no.7, pp 1084 - 1099 | - |
| dc.citation.title | 한국통신학회논문지 | - |
| dc.citation.volume | 43 | - |
| dc.citation.number | 7 | - |
| dc.citation.startPage | 1084 | - |
| dc.citation.endPage | 1099 | - |
| dc.identifier.kciid | ART002371998 | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.subject.keywordAuthor | Anomaly Detection | - |
| dc.subject.keywordAuthor | Burst-based | - |
| dc.subject.keywordAuthor | DNP3 | - |
| dc.subject.keywordAuthor | Intrusion Detection | - |
| dc.subject.keywordAuthor | SCADA | - |
| dc.subject.keywordAuthor | White List | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
