Cyber Security Research

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 11667 Experts worldwide ranked by ideXlab platform

Helge Janicke - One of the best experts on this subject based on the ideXlab platform.

  • 4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR 2016) - Index
    2016
    Co-Authors: Thomas Brandstetter, Helge Janicke, Kevin M. Jones
    Abstract:

    The 2nd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2014) brings together Researchers with an interest in the Security of industrial control systems in the light of their increasing exposure to Cyber-space. ICS-CSR is a Research conference aimed at high quality academic Research in the Cyber Security of industrial control system from the hardware, system and human-factor perspectives. We are very pleased to have a number of high quality Research contributions this year that range from Research experience in setting up test-beds for ICS Research to descriptions of new attacks and defences against existing industrial control systems. The Research reported this year in ICS-CSR is covering socio-technical aspects of ICS Security as well as technical subjects such as automated Security analyses of industrial plants. We would like to thank Kaspersky Lab for running the Kaspersky Industrial Protection Simulation as part of the ICS-CSR symposium, and Airbus Innovation Works and St. Polten University of Applied Sciences for helping in the organisation of this event. A particular thank you to all the members of our programme committee for providing so timely and excellent reviews of the submissions, the local organisers at St. Polten University of Applied Sciences and of course the dedicated authors for submitting their work to this event. Helge Janicke and Kevin Jones

  • Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research
    2015
    Co-Authors: Helge Janicke, Kevin Jones
    Abstract:

    The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2014) brings together Researchers with an interest in the Security of industrial control systems in the light of their increasing exposure to Cyber-space. ICS-CSR is a Research conference aimed at high quality academic Research in the Cyber Security of industrial control system from the hardware, system and human-factor perspectives.

  • proceedings of the 3rd international symposium for ics scada Cyber Security Research
    2015
    Co-Authors: Helge Janicke, Kevin Jones
    Abstract:

    The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR 2014) brings together Researchers with an interest in the Security of industrial control systems in the light of their increasing exposure to Cyber-space. ICS-CSR is a Research conference aimed at high quality academic Research in the Cyber Security of industrial control system from the hardware, system and human-factor perspectives.

  • Runtime-Monitoring for Industrial Control Systems
    Electronics, 2015
    Co-Authors: Helge Janicke, Stuart Webber, Andrew Nicholson, Antonio Cau
    Abstract:

    Industrial Control Systems (ICS) are widely deployed in nation's critical national infrastructures such as utilities, transport, banking and health-care. Whilst Supervisory Control and Data Acquisition (SCADA) systems are commonly deployed to monitor real-time data and operations taking place in the ICS they are typically not equipped to monitor the functional behaviour of individual components. In this paper (This paper expands on an earlier position paper presented at the International Symposium for Industrial Control System and SCADA Cyber Security Research 2014), we are presenting a runtime-monitoring technology that provides assurances of the functional behaviour of ICS components and demonstrates how this can be used to provide additional protection of the ICS against Cyber attacks similar to the well-known Stuxnet attack.

  • Second International Symposium for ICS & SCADA Cyber Security Research 2014
    2013
    Co-Authors: Helge Janicke, Kevin M. Jones
    Abstract:

    The 3rd International Symposium for Industrial Control System & SCADA Cyber Security Research (ICS-CSR) brings together Researchers with an interest in the Security of industrial control systems in the light of their increasing exposure to Cyber-space. ICS-CSR is a Research conference aimed at high-quality academic Research in the Cyber Security of industrial control system from the hardware, system and human-factor perspectives. The papers in this proceedings cover a wide spectrum of ICS Cyber Security issues and range from automated asset identification over Intrusion Detection to Active Defence using large scale honeypots. Other technical contributions include the extraction of vulnerabilities from ICS designs and the analysis of microgrid Cyber Security. This year, other topics are covered that address the response to incidents in ICS and SCADA systems as well as their forensically sound investigation. www.ics-csr.com

M. Ikko Neijonen - One of the best experts on this subject based on the ideXlab platform.

  • NEW2AN - Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
    Lecture Notes in Computer Science, 2015
    Co-Authors: Tero Kokkonen, Marko Silokunnas, Jarmo Siltanen, Mikhail Zolotukhin, Timo D. Hämäläinen, M. Ikko Neijonen
    Abstract:

    Because of the severe global Security threat of malwares, vulnerabilities and attacks against networked systems Cyber-Security Research, training and exercises are required for achieving Cyber resilience of organizations. Especially requirement for organizing Cyber Security exercises has become more and more relevant for companies or government agencies. Cyber Security Research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

  • Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
    Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
    Co-Authors: Tero Kokkonen, Marko Silokunnas, Jarmo Siltanen, Mikhail Zolotukhin, Timo Hämäläinen, M. Ikko Neijonen
    Abstract:

    Because of the severe global Security threat of malwares, vulnerabilities and attacks against networked systems Cyber-Security Research, training and exercises are required for achieving Cyber resilience of organizations. Especially requirement for organizing Cyber Security exercises has become more and more relevant for companies or government agencies. Cyber Security Research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

Tero Kokkonen - One of the best experts on this subject based on the ideXlab platform.

  • NEW2AN - Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
    Lecture Notes in Computer Science, 2015
    Co-Authors: Tero Kokkonen, Marko Silokunnas, Jarmo Siltanen, Mikhail Zolotukhin, Timo D. Hämäläinen, M. Ikko Neijonen
    Abstract:

    Because of the severe global Security threat of malwares, vulnerabilities and attacks against networked systems Cyber-Security Research, training and exercises are required for achieving Cyber resilience of organizations. Especially requirement for organizing Cyber Security exercises has become more and more relevant for companies or government agencies. Cyber Security Research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

  • Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
    Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
    Co-Authors: Tero Kokkonen, Marko Silokunnas, Jarmo Siltanen, Mikhail Zolotukhin, Timo Hämäläinen, M. Ikko Neijonen
    Abstract:

    Because of the severe global Security threat of malwares, vulnerabilities and attacks against networked systems Cyber-Security Research, training and exercises are required for achieving Cyber resilience of organizations. Especially requirement for organizing Cyber Security exercises has become more and more relevant for companies or government agencies. Cyber Security Research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

Kevin Jones - One of the best experts on this subject based on the ideXlab platform.

Rui Chang - One of the best experts on this subject based on the ideXlab platform.

  • vtet a virtual industrial control system testbed for Cyber Security Research
    2018 Third International Conference on Security of Smart Cities Industrial Control System and Communications (SSIC), 2018
    Co-Authors: Yaobin Xie, Wei Wang, Faren Wang, Rui Chang
    Abstract:

    Nowadays Industrial Control System (ICS) are suffering the increasing Cyber attacks. The ICS testbed is a ideal platform since that it could make the Security Research more controllable and safe. In contrast to the physically replication testbed, the virtual testbed is more economic, safe and maintainable which will makes it advantageous in the laboratorial environment. In this paper, we present VTET, a virtual ICS testbed for Cyber Security Research. VTET contains a virtual chemical industrial process, and both virtual and physical controllers. We provide a detailed description of VTET implementation such as the migration of controllers and the configuration of network. And we also demonstrate the 5 attack schemes simulated in VTET to prove its availability. Since the convenience of configuration and deployment, VTET is very suitable for academic ICS Security Research.

  • SSIC - VTET: A Virtual Industrial Control System Testbed for Cyber Security Research
    2018 Third International Conference on Security of Smart Cities Industrial Control System and Communications (SSIC), 2018
    Co-Authors: Yaobin Xie, Wei Wang, Faren Wang, Rui Chang
    Abstract:

    Nowadays Industrial Control System (ICS) are suffering the increasing Cyber attacks. The ICS testbed is a ideal platform since that it could make the Security Research more controllable and safe. In contrast to the physically replication testbed, the virtual testbed is more economic, safe and maintainable which will makes it advantageous in the laboratorial environment. In this paper, we present VTET, a virtual ICS testbed for Cyber Security Research. VTET contains a virtual chemical industrial process, and both virtual and physical controllers. We provide a detailed description of VTET implementation such as the migration of controllers and the configuration of network. And we also demonstrate the 5 attack schemes simulated in VTET to prove its availability. Since the convenience of configuration and deployment, VTET is very suitable for academic ICS Security Research.