DocumentCode
124386
Title
Techniques for detecting attacks on critical infrastructure
Author
Tupakula, Udaya ; Varadharajan, Vijay
Author_Institution
Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
fYear
2014
fDate
3-6 Feb. 2014
Firstpage
48
Lastpage
52
Abstract
Currently critical infrastructures such as SCADA are increasingly using commodity based hardware, software and TCP/IP protocol based communication. However the size of the current operating systems and applications are continuously increasing and it is extremely difficult task for the critical infrastructure operators for securing their systems from attacks. In this paper we propose techniques for detection of attacks on critical infrastructures and techniques for enforcing additional security policies for securing such systems.
Keywords
computer network security; critical infrastructures; attack detection; critical infrastructure; operating systems; security policies; Control systems; Malware; Monitoring; Runtime; Servers; Software; Critical Infrastructure; SCADA; Security policies;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Networking and Communications (ICNC), 2014 International Conference on
Conference_Location
Honolulu, HI
Type
conf
DOI
10.1109/ICCNC.2014.6785303
Filename
6785303
Link To Document