Obfuscation of Critical Infrastructure Network Traffic Using Fake Communication.
Sungho JeonJeong-Han YunWoonyon KimPublished in: CRITIS (2014)
Keyphrases
- network traffic
- critical infrastructure
- cyber security
- intrusion detection
- computer networks
- intrusion detection system
- network management
- network security
- anomaly detection
- data acquisition
- smart grid
- communication networks
- information security
- communication systems
- risk analysis
- network intrusion detection
- control system
- homeland security
- reverse engineering
- databases
- static analysis
- database systems
- data mining