A Comparison of ICS Datasets for Security Research Based on Attack Paths.
Seungoh ChoiJeong-Han YunSin-Kyu KimPublished in: CRITIS (2018)
Keyphrases
- security measures
- cyber attacks
- key exchange protocol
- security vulnerabilities
- information security
- network security
- denial of service attacks
- countermeasures
- malicious attacks
- intrusion detection
- buffer overflow
- authentication mechanism
- security issues
- benchmark datasets
- security management
- security risks
- authentication protocol
- computer security
- security requirements
- malicious users
- fault injection
- dos attacks
- information leakage
- access control