Читать книгу SCADA Security - Xun Yi - Страница 4
List of Illustrations
Оглавление1 Chapter 1Figure 1.1 SCADA vulnerabilities revealed since 2001 in OSVDB.
2 Chapter 2Figure 2.1 First‐generation SCADA architecture.Figure 2.2 Second‐generation SCADA architecture.Figure 2.3 Third‐generation SCADA architecture.Figure 2.4 The Modbus frame.
3 Chapter 3Figure 3.1 SCADAVT Architecture.Figure 3.2 IOModules protocol message structure.Figure 3.3 The protocol message structure of the WaterSystem Server.Figure 3.4 The simulation of a water distribution system.Figure 3.5 SCADA network topology for controlling the scenario of the water ...Figure 3.6 The water levels over a period of time for and without contro...Figure 3.7 The water levels over a period of time for and with control s...Figure 3.8 The unsuccessful and successful connections and their elapsed tim...Figure 3.9 The effect of DDoS, which targets , on the water volume of and...Figure 3.10 The effect of an integrity attack, which targets , on the water...
4 Chapter 4Figure 4.1 Clustering of the two first principal components of a sample of t...Figure 4.2 An illustration of the use of the triangle inequality for searchi...Figure 4.3 An investigation of the impact of cluster size, which is influenc...Figure 4.4 The efficiency of the baseline methods and NNVWC against ENN in...Figure 4.5 The construction time of the baseline methods and NNVWC for each...
5 Chapter 5Figure 5.1 Compromised FEP sends undesired command and falsifies the feedbac...Figure 5.2 Compromised application server sending false information.Figure 5.3 The steps of the SDAD approach.Figure 5.4 The normal operation of the SCADA points , , , , , .Figure 5.5 Illustration of an inconsistency scoring method based on intra‐cl...Figure 5.6 (a and c) The behavior of consistent/inconsistent observations of...Figure 5.7 The extracted proximity‐detection rules for two data points (attr...Figure 5.8 Simulation of a water distribution system.
6 Chapter 6Figure 6.1 Overview of GATUD.Figure 6.2 The categorization of unlabeled data after applying the anomaly‐s...
7 Chapter 7Figure 7.1 Security with TPASS.Figure 7.2 The TPASS Protocol based on a Two‐Phase Commitment.Figure 7.3 The TPASS Protocol based on Zero‐Knowledge Proof.Figure 7.4 Comparison of time spent (in seconds) for setting up.Figure 7.5 Comparison of communication size (in KB) for setting up.Figure 7.6 Comparison of time spent for retrieving.Figure 7.7 Comparison of communication size for retrieving.Figure 7.8 Comparison of average time spent by a server in retrieving.Figure 7.9 Comparison of average communication size for a server in retrievi...