A survey on SCADA systems: secure protocols, incidents, threats and tactics

D Pliatsios, P Sarigiannidis, T Lagkas… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring
and control components of critical infrastructures, such as power, telecommunication …

DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
Distributed denial-of-service (DDoS) attacks have become a weapon of choice for hackers,
cyber extortionists, and cyber terrorists. These attacks can swiftly incapacitate a victim …

Software defined networking architecture, security and energy efficiency: A survey

DB Rawat, SR Reddy - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Software-defined networking (SDN) is an emerging paradigm, which breaks the vertical
integration in traditional networks to provide the flexibility to program the network through …

Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges

MS Mahmoud, MM Hamdan, UA Baroudi - Neurocomputing, 2019 - Elsevier
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …

Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments

K Giotis, C Argyropoulos, G Androulidakis… - Computer Networks, 2014 - Elsevier
Abstract Software Defined Networks (SDNs) based on the OpenFlow (OF) protocol export
control-plane programmability of switched substrates. As a result, rich functionality in traffic …

Cyber–physical systems: A perspective at the centennial

KD Kim, PR Kumar - Proceedings of the IEEE, 2012 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) are the next generation of engineered systems in which
computing, communication, and control technologies are tightly integrated. Research on …

Attacks against process control systems: risk assessment, detection, and response

AA Cárdenas, S Amin, ZS Lin, YL Huang… - Proceedings of the 6th …, 2011 - dl.acm.org
In the last years there has been an increasing interest in the security of process control and
SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have …

[PDF][PDF] Control: A perspective.

KJ Åström, PR Kumar - Autom., 2014 - bwang-ccny.github.io
Nature discovered feedback long ago. It created feedback mechanisms and exploited them
at all levels, that are central to homeostasis and life. As a technology, control dates back at …

Revisiting traffic anomaly detection using software defined networking

SA Mehdi, J Khalid, SA Khayam - … , RAID 2011, Menlo Park, CA, USA …, 2011 - Springer
Despite their exponential growth, home and small office/home office networks continue to be
poorly managed. Consequently, security of hosts in most home networks is easily …

Mining anomalies using traffic feature distributions

A Lakhina, M Crovella, C Diot - ACM SIGCOMM computer …, 2005 - dl.acm.org
The increasing practicality of large-scale flow capture makes it possible to conceive of traffic
analysis methods that detect and identify a large and diverse set of anomalies. However the …