Techniques for detecting attacks on critical infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Abstract

Currently critical infrastructures such as SCADA are increasingly using commodity based hardware, software and TCP/IP protocol based communication. However the size of the current operating systems and applications are continuously increasing and it is extremely difficult task for the critical infrastructure operators for securing their systems from attacks. In this paper we propose techniques for detection of attacks on critical infrastructures and techniques for enforcing additional security policies for securing such systems.

Original languageEnglish
Title of host publication2014 International Conference on Computing, Networking and Communications, ICNC 2014
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages48-52
Number of pages5
DOIs
Publication statusPublished - 2014
Event2014 International Conference on Computing, Networking and Communications, ICNC 2014 - Honolulu, HI, United States
Duration: 3 Feb 20146 Feb 2014

Other

Other2014 International Conference on Computing, Networking and Communications, ICNC 2014
CountryUnited States
CityHonolulu, HI
Period3/02/146/02/14

Fingerprint Dive into the research topics of 'Techniques for detecting attacks on critical infrastructure'. Together they form a unique fingerprint.

  • Cite this

    Tupakula, U., & Varadharajan, V. (2014). Techniques for detecting attacks on critical infrastructure. In 2014 International Conference on Computing, Networking and Communications, ICNC 2014 (pp. 48-52). [6785303] Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ICCNC.2014.6785303