ICS security testbed with delay attack case study.
Emrah KorkmazAndrey M. DolgikhMatthew DavisVictor A. SkorminPublished in: MILCOM (2016)
Keyphrases
- case study
- security measures
- cyber attacks
- security vulnerabilities
- countermeasures
- key exchange protocol
- information security
- fault injection
- malicious users
- intrusion detection
- malicious attacks
- denial of service attacks
- authentication mechanism
- security issues
- security threats
- authentication protocol
- security risks
- security problems
- intrusion detection system
- encryption algorithm
- defense mechanisms
- attack scenarios
- cyber security
- security policies
- key agreement
- security protocols
- malicious activities
- security mechanisms
- buffer overflow
- access control
- information leakage
- network security
- security requirements
- software development
- elliptic curve
- development process
- malicious nodes
- secret key
- identity theft
- encryption scheme
- forensic analysis
- security management
- physical layer