Skip to main content

Whitelist Generation Technique for Industrial Firewall in SCADA Networks

  • Conference paper
  • First Online:
Frontier and Innovation in Future Computing and Communications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 301))

Abstract

The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. But, they are becoming more and more vulnerable to cyber-attacks due to utilize standard protocols and increase connectivity. The purpose of this paper is to introduce our work and confirm the validity of our approach for identifying network and application protocol attacks in SCADA networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stouffer K, Falco J, Scarfone K Guide to industrial control systems (ICS) security. Special publication NIST 800(82)

    Google Scholar 

  2. Galloway B, Hancke GP (2013) Introduction to industrial control networks. IEEE Commun Surv Tutorials 15(2), Second Quarter

    Google Scholar 

  3. Igure VM, Laughter SA, Williams RD (2006) Security issues in SCADA networks. Comput Secur 25(7):498–506

    Article  Google Scholar 

  4. Stouffer K, Falco J, Kent K (2006) Guide to supervisory control and data acquisition (SCADA) and industrial control systems security. Special Publication NIST-SP-800-82-2006, National Institute of Standards and Technology (NIST)

    Google Scholar 

  5. Modbus Application Protocol V1.1b3, Modbus Organization, Inc. Retrieved 2 Aug 2013

    Google Scholar 

  6. http://www.digitalbond.com/scadapedia/protocols/modbus-2/

  7. http://www.metasploit.com/

  8. http://www.tenable.com/products/nessus

  9. https://code.google.com/p/modscan/

  10. http://www.digitalbond.com/tools/basecamp/

  11. Barbosa R, Pras A, Sadre R (2013) Flow whitelisting in SCADA networks. In: Seventh annual IFIP working group 11.10 international conference on critical infrastructure protection

    Google Scholar 

  12. http://www.digitalbond.com/tools/quickdraw/

Download references

Acknowledgments

This work was supported by the IT R&D program of MSIP/KEIT. [010041560, A development of anomaly detection and a multi-layered response technology to protect an intranet of a control system for the availability of pipeline facilities].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong-Ho Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Kang, DH., Kim, BK., Na, JC., Jhang, KS. (2014). Whitelist Generation Technique for Industrial Firewall in SCADA Networks. In: Park, J., Zomaya, A., Jeong, HY., Obaidat, M. (eds) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol 301. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8798-7_63

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8798-7_63

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8797-0

  • Online ISBN: 978-94-017-8798-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics