M. J. AssanteR. M. Lee 2015 October The Industrial Control System Cyber Kill Chain Technical report, SANS Institute
M. J. AssanteR. M. LeeT. Conway 2017 August Modular ICS Malware. Technical report Electricity Information Sharing and Analysis Center (E-ISAC)
A. Cherepanov 2017 June Win32/Industroyer. A new threat for industrial control systems. Technical report ESET
B. Claise 2004 October Cisco Systems NetFlow Services Export Version 9. IETF RFC 3954
B. ClaiseB. Trammel 2013 September Information Model for IP Flow Information Export (IPFIX). IETF RFC 7012
B. ClaiseB. TrammelP. Aitken 2013 September Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. IETF RFC 7011
Dragos 2017 June CrashOverride. Analysis of the Threat of Electric Grid Operations. Technical report Dragos Inc
ENISA 2016 December Communication network dependencies for ICS/SCADA Systems. Technical report European Union Agency for Network and Information Security (ENISA)
R. Gerhards 2009 March The Syslog Protocol IETF RFC 5424
M. Horkan 2015 July Challenges for IDS/IPS Deployment in Industrial Control Systems. Technical report SANS Institute
IEC 2006 June Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standard transport profiles. Standard IEC 60870-5-104:2006 International Electrotechnical Commission Geneva
J. JarmakiewiczK. ParobczakK. Maślanka 2017 Cybersecurity protection for power grid control infrastructures International Journal of Critical Infrastructure Protection 18 20 33
E. D. KnappJ. T. Langill 2015 Industrial Network Security. Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress
R. M. LeeM. J. AssanteT. Conway 2016 March Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense Use Case. Technical report Electricity Information Sharing and Analysis Center (E-ISAC)
C.-Y. LinS. Nadjm-Tehrani 2018 Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks Proceedings of the 4th ACM Workshop on Cyber-Physical System Security CPSS ’18 New York, NY, USA 51 60 ACM
Z. LuX. LuW. WangC. Wang 2010 Oct Review and evaluation of security threats on the communication networks in the smart grid 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1830 1835
P. Matoušek 2017 Description and analysis of IEC 104 Protocol. Technical Report FIT-TR-2017-12 Brno University of Technology
P. MaynardK. McLaughlinB. Haberler 2014 Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks Proceedings of the 2Nd International Symposium on ICS & SCADA Cyber Security Research 2014 ICS-CSR 2014 UK 30 42 BCS
B. MillerD. C. Rowe 2012 A survey of SCADA and critical infrastructure incidents In Proceedings of the 1st Annual conference on Research in information technology, RIIT ’12 51 56 ACM
R. PresuhnJ. CaseK. McCloghrieM. RoseS. Waldbusser 2002 December Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP) Ietf rfc 3416
K. StoufferV. PillitteriM. AbramsA. Hahn 2015 Guide to Industrial Control Systems (ICS) Security. Technical Report NIST-SP-800-82r2 National Institute of Standards and Technology
Y. YangK. McLaughlinT. LittlerS. SezerB. PranggonoH. F. Wang 2013 July Intrusion detection system for iec 60870-5-104 based scada networks 2013 IEEE Power Energy Society General Meeting 1 5