Simple record

dc.contributor.authorSainz Oruna, Markel
dc.contributor.authorGaritano, Iñaki
dc.contributor.authorIturbe, Mikel
dc.contributor.authorZurutuza, Urko
dc.date.accessioned2022-11-09T10:30:35Z
dc.date.available2022-11-09T10:30:35Z
dc.date.issued2020
dc.identifier.issn1368-9894en
dc.identifier.issn1367-0751en
dc.identifier.otherhttps://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=154843en
dc.identifier.urihttps://hdl.handle.net/20.500.11984/5813
dc.description.abstractSpecifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks (SDNs), new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and presents the set up and results of a pilot experiment carried out in a scaled physical implementation. The experimental set up consists in the detection of ICMP flood and packet payload alteration based on signature comparison. Results point to the potential viability of the technology for intrusion detection and the need of researching in architectural scalability.en
dc.description.sponsorshipGobierno de Españaes
dc.description.sponsorshipGobierno Vasco-Eusko Jaurlaritzaes
dc.description.sponsorshipDiputación Foral de Gipuzkoaes
dc.language.isoengen
dc.publisherOxford Academicen
dc.rights© 2019 The Authors. Published by Oxford University Press. All rights reserved.en
dc.subjectSoftware defined networkingen
dc.subjectIndustrial control systemsen
dc.subjectsecurityen
dc.subjectanomaly detectionen
dc.titleDeep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concepten
dcterms.accessRightshttp://purl.org/coar/access_right/c_abf2en
dcterms.sourceLogic Journal of the IGPLen
local.contributor.groupAnálisis de datos y ciberseguridades
local.description.peerreviewedtrueen
local.description.publicationfirstpage461en
local.description.publicationlastpage472en
local.identifier.doihttps://doi.org/10.1093/jigpal/jzz060en
local.relation.projectIDinfo:eu-repo/grantAgreement/GE/Ayudas para la Excelencia de los Equipos de Investigación avanzada en ciberseguridad/INCIBEC-2015-02495/ES//en
local.relation.projectIDinfo:eu-repo/grantAgreement/GV/Elkartek 2017/KK-2017-00044/CAPV/Sekurtasun teknologiak/SEKUTEKen
local.relation.projectIDinfo:eu-repo/grantAgreement/DFG/Programa de Red Guipuzcoana de Ciencia, Tecnología e Innovación 2017/93-17/GIP/Nuevas aproximaciones para tecnologías de Ciberseguridad Industrial/POSICen
local.embargo.enddate2020-12-31
local.source.detailsVol. 28. N. 4. Pp. 461-472, 2020en
oaire.format.mimetypeapplication/pdf
oaire.file$DSPACE\assetstore
oaire.resourceTypehttp://purl.org/coar/resource_type/c_6501en
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Simple record