Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/35720
DC FieldValueLanguage
dc.contributor.advisorCruz, Tiago José dos Santos Martins da-
dc.contributor.authorBarrigas, Jorge Filipe-
dc.date.accessioned2017-01-13T16:07:09Z-
dc.date.available2017-01-13T16:07:09Z-
dc.date.issued2014-07-07-
dc.identifier.urihttps://hdl.handle.net/10316/35720-
dc.descriptionDissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia da Universidade de Coimbrapt
dc.description.abstractDuring the last years, some of the attacks towards SCADA made headlines, helping raise awareness. Some of the vulnerabilities may even be exploited to harm other systems, eventually, ending compromising specific points of SCADA networks. At the same time, a growing number of threats related with the physical layer made new issues and low-level mechanisms emerged, requiring careful approach and monitoring to secure such devices. Threats of this type are considered to be even more dangerous than SCADA-specific ones, since these operate at a lower level, unnoticed to scanners and anti-viruses. Considering this scenario we can expect a growing number of these threats to be affecting SCADA components, if adequate countermeasures are not taken. Over the last ten months (from September 16, 2013 until June 27, 2014), a new concept was developed, in the context of the FP7 CockpitCI project, for the current thesis, to reinforce the security of SCADA systems. This concept refers to a device installed in a key juncture of the network, with the purpose of monitoring the behavior of specific components, while reporting detected anomalies. However, even before this thesis (during the second curriculum semester of the year 2012/2013) there was already some research being made in this sense, which reflects in the amount of results included in this document.pt
dc.language.isoengpt
dc.rightsopenAccesspt
dc.subjectSCADA Systemspt
dc.subjectDetection Architecturept
dc.subjectShadow RTUpt
dc.subjectProbing Architecturept
dc.subjectMan-in-the-middle Attack Scenariospt
dc.titleSecurity Probes for Industrial Control Networkspt
dc.typemasterThesispt
degois.publication.locationCoimbrapt
degois.publication.titleSecurity Probes for Industrial Control Networkspor
dc.date.embargo2014-07-07*
dc.identifier.tid201539047pt
thesis.degree.grantor00500::Universidade de Coimbrapt
thesis.degree.nameMestrado em Engenharia Informática-
uc.degree.grantorUnit0501 - Faculdade de Ciências e Tecnologiapor
uc.rechabilitacaoestrangeiranopt
uc.date.periodoEmbargo0pt
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.grantfulltextopen-
item.openairetypemasterThesis-
item.languageiso639-1en-
item.fulltextCom Texto completo-
item.cerifentitytypePublications-
crisitem.advisor.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.advisor.parentresearchunitFaculty of Sciences and Technology-
crisitem.advisor.orcid0000-0001-9278-6503-
Appears in Collections:UC - Dissertações de Mestrado
FCTUC Eng.Informática - Teses de Mestrado
Files in This Item:
File Description SizeFormat
Security Probes for Industrial Control Networks.pdf2.56 MBAdobe PDFView/Open
Show simple item record

Page view(s) 10

826
checked on Aug 27, 2024

Download(s) 20

1,177
checked on Aug 27, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.