SCADA Security. Xun Yi

Читать онлайн книгу.

SCADA Security - Xun Yi


Скачать книгу
tion id="u84a2a32a-accd-5e0b-9bc5-e07f21cda463">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright Page

      4  FOREWORD

      5  PREFACE

      6  ACRONYMS

      7  CHAPTER 1: Introduction 1.1 Overview 1.2 EXISTING SOLUTIONS 1.3 SIGNIFICANT RESEARCH PROBLEMS 1.4 BOOK FOCUS 1.5 BOOK ORGANIZATION

      8  CHAPTER 2: Background 2.1 SCADA SYSTEMS 2.2 INTRUSION DETECTION SYSTEM (IDS) 2.3 IDS Approaches

      9  CHAPTER 3: SCADA‐Based Security Testbed 3.1 MOTIVATION 3.2 GUIDELINES TO BUILDING A SCADA SECURITY TESTBED 3.3 SCADAVT DETAILS 3.4 SCADAVT APPLICATION 3.5 ATTACK SCENARIOS 3.6 CONCLUSION 3.7 APPENDIX FOR THIS CHAPTER

      10  CHAPTER 4: Efficient k‐Nearest Neighbour Approach Based on Various‐Widths Clustering 4.1 INTRODUCTION 4.2 RELATED WORK 4.3 THE

NNVWC APPROACH 4.4 EXPERIMENTAL EVALUATION 4.5 CONCLUSION

      11  Chapter 5: SCADA Data‐Driven Anomaly Detection 5.1 INTRODUCTION 5.2 SDAD APPROACH 5.3 EXPERIMENTAL SETUP 5.4 RESULTS AND ANALYSIS 5.5 SDAD LIMITATIONS 5.6 CONCLUSION

      12  CHAPTER 6: A Global Anomaly Threshold to Unsupervised Detection 6.1 INTRODUCTION 6.2 RELATED WORK 6.3 GATUD APPROACH 6.4 EXPERIMENTAL SETUP 6.5 RESULTS AND DISCUSSION 6.6 CONCLUSION

      13  CHAPTER 7: Threshold Password‐Authenticated Secret Sharing Protocols 7.1 MOTIVATION 7.2 EXISTING SOLUTIONS 7.3 DEFINITION OF SECURITY 7.4 TPASS PROTOCOLS 7.5 SECURITY ANALYSIS 7.6 EXPERIMENTS 7.7 CONCLUSION

      14  CHAPTER 8: Conclusion SUMMARY FUTURE WORK

      15  REFERENCES

      16  INDEX

      17  Wiley Series on Parallel and Distributed Computing

      18  End User License Agreement

      List of Tables

      1 Chapter 3TABLE 3.1 A Screenshot of the Configuration of IOModuleGateTABLE 3.2 The distribution of people throughout the areasTABLE 3.3 Melburnians' Average Water Usage per Day over WeekTABLE 3.4 The Deployment of PLCs over Field AreasTABLE 3.5 Field Devices and Their Respective Supervised DevicesTABLE 3.6 The Control and Monitoring Instructions that MTU Performs Through E...TABLE 3.7 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.8 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.9 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.10 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.11 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.12 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.13 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.14 Mapping of Modbus Registers to the Process Parameters of the Imple...

      2 Chapter 4TABLE 4.1 Variables, data structures, and functions employed by

NNVWCTABLE 4.2 Variables, data
Скачать книгу