Whitelisting for Critical IT-Based Infrastructure
نویسندگان
چکیده
Critical infrastructures are falsely believed to be safe when they are isolated from the Internet. However, the recent appearance of Stuxnet demonstrated that isolated networks are no longer safe. We observe that a better intrusion detection scheme can be established based on the unique features of critical infrastructures. In this paper, we propose a whitelist-based detection system. Network and application-level whitelists are proposed, which are combined to form a novel cross-layer whitelist. Through experiments, we confirm that the proposed whitelists can exactly detect attack packets, which cannot be achieved by existing schemes. key words: traffic monitoring, network management, SCADA
منابع مشابه
Institutionen För Datavetenskap Application Whitelisting Smartphones in High Security Environments Application Whitelisting Smartphones in High Security Environments
Today, smartphones are in widespread use by consumers, commercial companies and government authorities. Unfortunately, there are many examples of applications carrying out malicious activities, such as stealing information or subscribing to premium-rate services. In this thesis work, a novel application whitelisting process (AWP) is proposed. It defines processes for application security audits...
متن کاملMeasuring the Impact of Urban Infrastructure on each other in terms of Passive Defense Perspective using Fuzzy DEMATEL, Case Study: Guilan Province
Research objectives: In construction of main urban infrastructures, observing the principles of passive defense in order to maintain safety and reduce vulnerabilities in critical situations is very important. In this study, critical infrastructures were identified and ranked. Finally, the most effective and impressible infrastructures for successful management in non-operating defense were iden...
متن کاملThe Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists), they have not caught on in email systems. Instead, most of us use spam filters that try to identify all the senders we do not want to accept email from. With whitelists we only need to identify the much smaller set of...
متن کاملAnalysis of spam over Internet telephony protection techniques
Spam in Internet telephony networks is likely to become a large problem in the future, as more and more people and companies switch from traditional telephone networks to Voice over IP (VoIP) networks. VoIP spam is likely to have a great strain on the network. The question that will be answered in with this research is: “What methods exist against spam over Internet Telephony and which techniqu...
متن کاملIdentification and prioritization of influential factors for the knowledge management success using DEMATEL method
This paper aims to use a priority framework based on Decision making trial and evaluation laboratory (DEMATEL) to help organizations build awareness of the critical influential factors affecting successful implementation of KM. To identify critical influential factors, the authors studied and reviewed relevant literature from numerous fields of study associated with the essential issues of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 96-B شماره
صفحات -
تاریخ انتشار 2013