Flow whitelisting in SCADA networks

RRR Barbosa, R Sadre, A Pras - International journal of critical …, 2013 - Elsevier
… with corporate networks and the Internet. This paper describes an approach for improving
the security of SCADA networks using flow whitelisting. A flow whitelist describes legitimate …

A Practical flow white list approach for SCADA systems

A Lemay, J Rochon, JM Fernandez - … for ICS & SCADA Cyber …, 2016 - scienceopen.com
… for implementing flow white listing in SCADASCADA network could reap the benefits right
away. This section presents a practical flow white listing approach that extracts existing flows, …

Traffic-locality-based creation of flow whitelists for SCADA networks

S Choi, Y Chang, JH Yun, W Kim - … ICCIP 2015, Arlington, VA, USA, March …, 2015 - Springer
flow whitelisting based on the determination of client-server relationships in a SCADA network
This chapter describes a methodology for constructing flow whitelists for SCADA networks

Whitelists based multiple filtering techniques in SCADA sensor networks

DH Kang, BK Kim, JC Na… - Journal of Applied …, 2014 - Wiley Online Library
… the security of SCADA based on flow whitelisting. Continuing with flow based anomaly
detection techniques, Siris and Papagalou [26] proposed an approach to apply network traffic …

Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis

KS Shim, I Sohn, E Lee, W Seok… - Journal of Web …, 2021 - ieeexplore.ieee.org
… ICS/SCADA network and protecting it by implementing whitelist-based network management.
… protocol usually exchanges all the information in a single flow instead of multiple flows. In …

[PDF][PDF] Exploratory analysis of Modbus and general IT network flows in a water SCADA system

A Srivastav, C Ortega, P Ahuja, M Christian… - … Control System Security …, 2015 - acsac.org
… establish a whitelist of allowed connections between two IP addresses might raise many
false alarms for general IT traffic, it might be a good solution if we focus on whitelisting Modbus …

Anomaly detection in SCADA systems: a network based approach

RRR Barbosa - 2014 - research.utwente.nl
flow whitelisting becomes a promising solution for SCADA environments. We show that flow
whitelists have a manageable size, considering the number of hosts in the network, and that …

Whitelist representation for FTP service in SCADA system by using structured ACL model

W Jung, SM Kim, YH Goo… - … 18th Asia-Pacific Network …, 2016 - ieeexplore.ieee.org
… of flow whitelists. In this study, they only use the 5-tuple information of flow to make flow whitelist
… Also, they confirmed the validity of their flow whitelist by applying to real SCADA system …

Structured whitelist generation in SCADA network using PrefixSpan algorithm

WS Jung, JH Yun, SK Kim, KS Shim… - … Asia-Pacific Network …, 2017 - ieeexplore.ieee.org
… to real SCADA network traffic to test its feasibility. Table 2 shows the SCADA network traffic
used in … Flow whitelisting in SCADA networks." International journal of critical infrastructure …

Visualizing network flows and related anomalies in industrial networks using chord diagrams and whitelisting

M Iturbe, I Garitano, U Zurutuza, R Uribeetxeberria - 2016 - ebiltegia.mondragon.edu
… in industrial networks. In this paper, we present a network flow and related alert visualization
system based on chord diagrams. The system represents the detected network flows within …