{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:51:37Z","timestamp":1772643097825,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031160745","type":"print"},{"value":"9783031160752","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16075-2_48","type":"book-chapter","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T10:02:42Z","timestamp":1661940162000},"page":"646-658","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion Detection System for Industrial Network"],"prefix":"10.1007","author":[{"given":"Woo Young","family":"Park","sequence":"first","affiliation":[]},{"given":"Sang Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Duy-Son","family":"Vu","sequence":"additional","affiliation":[]},{"given":"Chang Han","family":"Song","sequence":"additional","affiliation":[]},{"given":"Hee Soo","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Hyeon","family":"Jo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"issue":"6","key":"48_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2017.4251102","volume":"15","author":"I Ahmed","year":"2017","unstructured":"Ahmed, I., Obermeier, S., Sudhakaran, S., Roussev, V.: Programmable logic controller forensics. IEEE Secur. Priv. 15(6), 18\u201324 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"48_CR2","doi-asserted-by":"publisher","unstructured":"Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K.: ICS\/SCADA system security for CPS. In: Cyber Security for Cyber Physical Systems. SCI, vol. 768, pp. 89\u2013113. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75880-0_5","DOI":"10.1007\/978-3-319-75880-0_5"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Kang, D., Kim, B., Na, J., Jhang, K.: Whitelists based multiple filtering techniques in SCADA sensor networks. J. Appl. Math. 597697 (2014)","DOI":"10.1155\/2014\/597697"},{"key":"48_CR4","unstructured":"Wikipedia: DNP3. https:\/\/en.wikipedia.org\/wiki\/DNP3. Accessed 6 Jan 2022"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In: IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society. IEEE, Melbourne (2011)","DOI":"10.1109\/IECON.2011.6120048"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Patil, A., Shinde, S., Banerjee, S.: Stuxnet-tool for zero-day attack. In: Handbook of Research on Cyber Crime and Information Privacy, pp. 652\u2013675. IGI Global (2021)","DOI":"10.4018\/978-1-7998-5728-0.ch030"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Robinson, M.: The SCADA threat landscape. In: 1st International Symposium for ICS & SCADA Cyber Security Research (ICS-CSR 2013), Leicester (2013)","DOI":"10.14236\/ewic\/ICSCSR2013.4"},{"key":"48_CR8","volume-title":"Stuxnet: Cyberwar Revolution in Military Affairs","author":"P Shakarian","year":"2011","unstructured":"Shakarian, P.: Stuxnet: Cyberwar Revolution in Military Affairs. Military Academy West Point, New York (2011)"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Pretorius, B., van Niekerk, B.: Cyber-security for ICS\/SCADA: a South African perspective. In: Cyber Warfare And Terrorism: Concepts, Methodologies, Tools, and Applications, pp. 613\u2013630. IGI Global (2020)","DOI":"10.4018\/978-1-7998-2466-4.ch038"},{"key":"48_CR10","first-page":"907","volume":"77","author":"R Setola","year":"2019","unstructured":"Setola, R., Faramondi, L., Salzano, E., Cozzani, V.: An overview of cyber attack to industrial control system. Chem. Eng. Trans. 77, 907\u2013912 (2019)","journal-title":"Chem. Eng. Trans."},{"key":"48_CR11","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-94-017-8798-7_64","volume-title":"Frontier and innovation in future computing and communications","author":"B Kim","year":"2014","unstructured":"Kim, B., Kang, D.-H., Na, J.-C., Chang, B.-H., Chung, T.-M.: Design of industrial firewall system based on multiple access control filter. In: Park, J.J.H., Zomaya, A., Jeong, H.-Y., Obaidat, M. (eds.) Frontier and innovation in future computing and communications. LNEE, vol. 301, pp. 535\u2013544. Springer, Dordrecht (2014). https:\/\/doi.org\/10.1007\/978-94-017-8798-7_64"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Kim, B. K., Kang, D. H., Na, J. C., Chung, T. M.:\u00a0Abnormal traffic filtering mechanism for protecting ICS networks.\u00a0In: 2016 18th International Conference on Advanced Communication Technology (ICACT). IEEE. PyeongChang (2016)","DOI":"10.1109\/ICACT.2016.7423422"},{"issue":"3","key":"48_CR13","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TII.2019.2946791","volume":"16","author":"W Liang","year":"2019","unstructured":"Liang, W., Li, K.-C., Long, J., Kui, X., Zomaya, A.Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063\u20132071 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"48_CR14","unstructured":"Tsang, C.-H., Kwong, S.: Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In: 2005 IEEE International Conference on Industrial Technology. IEEE, Hong Kong (2005)"},{"issue":"1","key":"48_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.icte.2018.01.002","volume":"4","author":"J Kim","year":"2018","unstructured":"Kim, J., Park, J.: FPGA-based network intrusion detection for IEC 61850-based industrial network. ICT Express 4(1), 1\u20135 (2018)","journal-title":"ICT Express"},{"key":"48_CR16","unstructured":"Tomlin, L., Farnam, M.R., Pan, S.: A clustering approach to industrial network intrusion detection. In: Proceedings of the 2016 Information Security Research and Education (INSuRE) Conference (INSuRECon-16), Huntsville (2016)"},{"key":"48_CR17","unstructured":"Anton, S.D., Ahrens, L., Fraunholz, D., Schotten, H.D.: Time is of the essence: machine learning-based intrusion detection in industrial time series data. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW). IEEE, Los Alamitos (2018)"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Kim, B., Kang, D., Na, J., Chung, T.: Abnormal traffic filtering mechanism for protecting ICS networks. In: 18th International Conference on Advanced Communication Technology (ICACT), Pyeong Chang (2016)","DOI":"10.1109\/ICACT.2016.7423422"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16075-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T09:55:14Z","timestamp":1700992514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16075-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9783031160745","9783031160752"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16075-2_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"1 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}