Generating models of infinite-state communications protocols using regular inference with abstraction, Proceedings of the Twenty-Second IFIP WG 6.1 International Conference on Testing Software and Systems, pp.188-204, 2010. ,
Anomaly Detection for Discrete Sequences: A Survey, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.5, pp.823-839, 2012. ,
DOI : 10.1109/TKDE.2010.235
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems, International Journal of Critical Infrastructure Protection, vol.6, issue.2, pp.63-75, 2013. ,
DOI : 10.1016/j.ijcip.2013.05.001
Challenges and opportunities in securing industrial control systems, 2012 Complexity in Engineering (COMPENG). Proceedings, 2012. ,
DOI : 10.1109/CompEng.2012.6242970
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols, Proceedings of the Fifteenth International Symposium on Research in Attacks, Intrusions and Defenses, pp.354-373, 2012. ,
DOI : 10.1007/978-3-642-33338-5_18
Intrusion detection using sequences of system calls, Journal of Computer Security, vol.6, issue.3, pp.151-180, 1998. ,
DOI : 10.3233/JCS-980109
Learning stateful models for network honeypots, Proceedings of the 5th ACM workshop on Security and artificial intelligence, AISec '12, pp.37-48, 2012. ,
DOI : 10.1145/2381896.2381904
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.9389
Sequence matching and learning in anomaly detection for computer security, Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, pp.43-49, 1997. ,
To Kill a Centrifuge: A Technical Analysis of What Stuxnet's Creators Tried to Achieve, The Langner Group, 2013. ,
Intrusion detection based on the short sequence model, Proceedings of the Seventh World Congress on Intelligent Control and Automation, pp.1449-1454, 2008. ,
SABOT, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.439-449, 2012. ,
DOI : 10.1145/2382196.2382244
Modbus/DNP3 State-Based Intrusion Detection System, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.729-736, 2010. ,
DOI : 10.1109/AINA.2010.86
URL : http://publications.jrc.ec.europa.eu/repository/handle/JRC56496
Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.265-274, 2002. ,
DOI : 10.1145/586110.586146
Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, National Institute of Standards and Technology, 2011. ,
Open Modbus/TCP Specification, Release 1.0, Schneider Electric, 1999. ,
Detecting intrusions using system calls: alternative data models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.133-145, 1999. ,
DOI : 10.1109/SECPRI.1999.766910
URL : http://eprints.maynoothuniversity.ie/1418/1/DetectingIntrusions.pdf