Whitelist Generation Technique for Industrial Firewall in SCADA Networks

Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang

Published: 2014, Last Modified: 27 Feb 2026FCC 2014EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-attacks due to utilize standard protocols and increase connectivity. The purpose of this paper is to introduce our work and confirm the validity of our approach for identifying network and application protocol attacks in SCADA networks.
Loading