{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:48:38Z","timestamp":1743119318728,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031578694"},{"type":"electronic","value":"9783031578700"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57870-0_4","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"37-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mitigating Resource Depletion and\u00a0Message Sequencing Attacks in\u00a0SCADA Systems"],"prefix":"10.1007","author":[{"given":"Neminath","family":"Hubballi","sequence":"first","affiliation":[]},{"given":"Nisha Kumari","family":"Barsha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Acarali, D., Rajarajan, M., Chema, D., Ginzburg, M.: Modelling DoS attacks & interoperability in the smart grid. In: Proceedings of the 29th International Conference on Computer Communications and Networks, ICCC 2020, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICCCN49398.2020.9209671"},{"key":"4_CR2","unstructured":"Matou\u0161ek, P., Havlena, V., Hol\u00edk, L.: Efficient modelling of ICS communication for anomaly detection using probabilistic automata. In: 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 81\u201389 (2021)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"J\u00f8rgensen, T.H., et al.: The EXpress data path: fast programmable packet processing in the operating system kernel. In: Proceedings of the 14th International Conference on Emerging Networking Experiments and Technologies, CoNEXT 2018, pp. 54\u201366 (2018)","DOI":"10.1145\/3281411.3281443"},{"key":"4_CR4","unstructured":"SCAPY. https:\/\/scapy.net\/"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Beasley, C., Zhong, X., Deng, J., Brooks, R., Venayagamoorthy, G.K.: A survey of electric power synchrophasor network cyber security. In: IEEE PES Innovative Smart Grid Technologies Conference Europe, pp. 1\u20135 (2014)","DOI":"10.1109\/ISGTEurope.2014.7028738"},{"key":"4_CR6","unstructured":"Evangeliou, I.E.: Vulnerabilities of the Modbus protocol. Ph.D. thesis, University of Piraeus, Greece (2018)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Aoufi, S., Derhab, A., Guerroumi, M.: Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J. Inf. Secur. Appl. 54 (2020)","DOI":"10.1016\/j.jisa.2020.102518"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: CPSCom: Proceedings of the 4th IEEE International Conference on Cyber, Physical and Social Computing, pp. 380\u2013388 (2011)","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448291","volume":"54","author":"N Tripathi","year":"2021","unstructured":"Tripathi, N., Hubballi, N.: Application layer denial-of-service attacks and defense mechanisms: a survey. ACM Comput. Surv. 54(4), 1\u201330 (2021)","journal-title":"ACM Comput. Surv."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Phillips, B., Gamess, E., Krishnaprasad, S.: An evaluation of machine learning-based anomaly detection in a SCADA system using the Modbus protocol. In: Proceedings of the 2020 ACM Southeast Conference, ASM-SE 2020, pp. 188\u2013196 (2020)","DOI":"10.1145\/3374135.3385282"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42162-022-00252-1","volume":"5","author":"M Anwar","year":"2022","unstructured":"Anwar, M., Lundberg, L., Borg, A.: Improving anomaly detection in SCADA network communication with attribute extension. Energy Inform. 5(1), 1\u201322 (2022)","journal-title":"Energy Inform."},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.ijcip.2013.05.001","volume":"6","author":"N Goldenberg","year":"2013","unstructured":"Goldenberg, N., Wool, A.: Accurate modeling of Modbus\/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6(2), 63\u201375 (2013)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3011018","volume":"8","author":"A Kleinmann","year":"2017","unstructured":"Kleinmann, A., Wool, A.: Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems. ACM Trans. Intell. Syst. Technol. 8(4), 1\u201321 (2017)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"4_CR14","unstructured":"StationGuard. https:\/\/www.omicronenergy.com\/en\/solution\/intrusion-detection-system-ids-for-the-power-grid\/#"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Nyasore, O.N., Zavarsky, P., Swar, B., Naiyeju, R., Dabra, S.: Deep packet inspection in industrial automation control system to mitigate attacks exploiting Modbus\/TCP vulnerabilities. In: 2020 IEEE International Conference on Intelligent Data and Security (IDS), pp. 241\u2013245 (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00051"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Lin, H., Slagell, A., Di Martino, C., Kalbarczyk, Z., Iyer, R.K.: Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, pp. 1\u20134 (2013)","DOI":"10.1145\/2459976.2459982"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Chan, A.C., Zhou, J.: Non-intrusive protection for legacy SCADA systems. IEEE Commun. Mag. (2023)","DOI":"10.1109\/MCOM.003.2200564"},{"key":"4_CR18","unstructured":"ZEEK IDS. https:\/\/old.zeek.org\/manual\/2.5.5\/broids\/index.html"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57870-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T22:44:43Z","timestamp":1731710683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57870-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578694","9783031578700"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57870-0_4","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}