Techniques for detecting attacks on critical infrastructure

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

Currently critical infrastructures such as SCADA are increasingly using commodity based hardware, software and TCP/IP protocol based communication. However the size of the current operating systems and applications are continuously increasing and it is extremely difficult task for the critical infrastructure operators for securing their systems from attacks. In this paper we propose techniques for detection of attacks on critical infrastructures and techniques for enforcing additional security policies for securing such systems.

Original languageEnglish
Title of host publication2014 International Conference on Computing, Networking and Communications, ICNC 2014
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages48-52
Number of pages5
ISBN (Electronic)9781479923588
DOIs
Publication statusPublished - 2014
Event2014 International Conference on Computing, Networking and Communications, ICNC 2014 - Honolulu, HI, United States
Duration: 3 Feb 20146 Feb 2014

Publication series

NameInternational Conference on Computer Networking and Communications
PublisherIEEE
ISSN (Print)2325-2626

Other

Other2014 International Conference on Computing, Networking and Communications, ICNC 2014
CountryUnited States
CityHonolulu, HI
Period3/02/146/02/14

Fingerprint Dive into the research topics of 'Techniques for detecting attacks on critical infrastructure'. Together they form a unique fingerprint.

Cite this