dc.contributor.author | Sainz Oruna, Markel | |
dc.contributor.author | Garitano, Iñaki | |
dc.contributor.author | Iturbe, Mikel | |
dc.contributor.author | Zurutuza, Urko | |
dc.date.accessioned | 2022-11-09T10:30:35Z | |
dc.date.available | 2022-11-09T10:30:35Z | |
dc.date.issued | 2020 | |
dc.identifier.issn | 1368-9894 | en |
dc.identifier.issn | 1367-0751 | en |
dc.identifier.other | https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&ficha_no=154843 | en |
dc.identifier.uri | https://hdl.handle.net/20.500.11984/5813 | |
dc.description.abstract | Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requiring expressly developed security countermeasures. Within the past decades, research has been focused in network-based intrusion detection systems. With the appearance of software-defined networks (SDNs), new opportunities and challenges have shown up in the research community. This paper describes the potential benefits of using SDNs in industrial networks with security purposes and presents the set up and results of a pilot experiment carried out in a scaled physical implementation. The experimental set up consists in the detection of ICMP flood and packet payload alteration based on signature comparison. Results point to the potential viability of the technology for intrusion detection and the need of researching in architectural scalability. | en |
dc.description.sponsorship | Gobierno de España | es |
dc.description.sponsorship | Gobierno Vasco-Eusko Jaurlaritza | es |
dc.description.sponsorship | Diputación Foral de Gipuzkoa | es |
dc.language.iso | eng | en |
dc.publisher | Oxford Academic | en |
dc.rights | © 2019 The Authors. Published by Oxford University Press. All rights reserved. | en |
dc.subject | Software defined networking | en |
dc.subject | Industrial control systems | en |
dc.subject | security | en |
dc.subject | anomaly detection | en |
dc.title | Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept | en |
dcterms.accessRights | http://purl.org/coar/access_right/c_abf2 | en |
dcterms.source | Logic Journal of the IGPL | en |
local.contributor.group | Análisis de datos y ciberseguridad | es |
local.description.peerreviewed | true | en |
local.description.publicationfirstpage | 461 | en |
local.description.publicationlastpage | 472 | en |
local.identifier.doi | https://doi.org/10.1093/jigpal/jzz060 | en |
local.relation.projectID | info:eu-repo/grantAgreement/GE/Ayudas para la Excelencia de los Equipos de Investigación avanzada en ciberseguridad/INCIBEC-2015-02495/ES// | en |
local.relation.projectID | info:eu-repo/grantAgreement/GV/Elkartek 2017/KK-2017-00044/CAPV/Sekurtasun teknologiak/SEKUTEK | en |
local.relation.projectID | info:eu-repo/grantAgreement/DFG/Programa de Red Guipuzcoana de Ciencia, Tecnología e Innovación 2017/93-17/GIP/Nuevas aproximaciones para tecnologías de Ciberseguridad Industrial/POSIC | en |
local.embargo.enddate | 2020-12-31 | |
local.source.details | Vol. 28. N. 4. Pp. 461-472, 2020 | en |
oaire.format.mimetype | application/pdf | |
oaire.file | $DSPACE\assetstore | |
oaire.resourceType | http://purl.org/coar/resource_type/c_6501 | en |
oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | en |