SCADA Security. Xun Yi
Читать онлайн книгу.tion id="u84a2a32a-accd-5e0b-9bc5-e07f21cda463">
Table of Contents
1 Cover
4 FOREWORD
5 PREFACE
6 ACRONYMS
7 CHAPTER 1: Introduction 1.1 Overview 1.2 EXISTING SOLUTIONS 1.3 SIGNIFICANT RESEARCH PROBLEMS 1.4 BOOK FOCUS 1.5 BOOK ORGANIZATION
8 CHAPTER 2: Background 2.1 SCADA SYSTEMS 2.2 INTRUSION DETECTION SYSTEM (IDS) 2.3 IDS Approaches
9 CHAPTER 3: SCADA‐Based Security Testbed 3.1 MOTIVATION 3.2 GUIDELINES TO BUILDING A SCADA SECURITY TESTBED 3.3 SCADAVT DETAILS 3.4 SCADAVT APPLICATION 3.5 ATTACK SCENARIOS 3.6 CONCLUSION 3.7 APPENDIX FOR THIS CHAPTER
10 CHAPTER 4: Efficient k‐Nearest Neighbour Approach Based on Various‐Widths Clustering 4.1 INTRODUCTION 4.2 RELATED WORK 4.3 THE NNVWC APPROACH 4.4 EXPERIMENTAL EVALUATION 4.5 CONCLUSION
11 Chapter 5: SCADA Data‐Driven Anomaly Detection 5.1 INTRODUCTION 5.2 SDAD APPROACH 5.3 EXPERIMENTAL SETUP 5.4 RESULTS AND ANALYSIS 5.5 SDAD LIMITATIONS 5.6 CONCLUSION
12 CHAPTER 6: A Global Anomaly Threshold to Unsupervised Detection 6.1 INTRODUCTION 6.2 RELATED WORK 6.3 GATUD APPROACH 6.4 EXPERIMENTAL SETUP 6.5 RESULTS AND DISCUSSION 6.6 CONCLUSION
13 CHAPTER 7: Threshold Password‐Authenticated Secret Sharing Protocols 7.1 MOTIVATION 7.2 EXISTING SOLUTIONS 7.3 DEFINITION OF SECURITY 7.4 TPASS PROTOCOLS 7.5 SECURITY ANALYSIS 7.6 EXPERIMENTS 7.7 CONCLUSION
14 CHAPTER 8: Conclusion SUMMARY FUTURE WORK
15 REFERENCES
16 INDEX
17 Wiley Series on Parallel and Distributed Computing
List of Tables
1 Chapter 3TABLE 3.1 A Screenshot of the Configuration of IOModuleGateTABLE 3.2 The distribution of people throughout the areasTABLE 3.3 Melburnians' Average Water Usage per Day over WeekTABLE 3.4 The Deployment of PLCs over Field AreasTABLE 3.5 Field Devices and Their Respective Supervised DevicesTABLE 3.6 The Control and Monitoring Instructions that MTU Performs Through E...TABLE 3.7 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.8 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.9 Mapping of Modbus Registers to the Process Parameters of the Implem...TABLE 3.10 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.11 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.12 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.13 Mapping of Modbus Registers to the Process Parameters of the Imple...TABLE 3.14 Mapping of Modbus Registers to the Process Parameters of the Imple...
2 Chapter 4TABLE 4.1 Variables, data structures, and functions employed by
NNVWCTABLE 4.2 Variables, data