{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:32:34Z","timestamp":1743042754256,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_29","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"328-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing SCADA Critical Network Against Internal and External Threats"],"prefix":"10.1007","author":[{"given":"Mounia","family":"El Anbal","sequence":"first","affiliation":[]},{"given":"Anas","family":"Abou El Kalam","sequence":"additional","affiliation":[]},{"given":"Siham","family":"Benhadou","sequence":"additional","affiliation":[]},{"given":"Fouad","family":"Moutaouakkil","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Medromi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"issue":"1","key":"29_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1002\/sec.698","volume":"7","author":"J Gao","year":"2014","unstructured":"Gao, J., Liu, J., Rajan, B., Nori, R., Fu, B., Xiao, Y., Philip Chen, C.L.: SCADA communication and security issues. Sec. Commun. Netw. 7(1), 175\u2013194 (2014)","journal-title":"Sec. Commun. Netw."},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s00607-010-0107-y","volume":"91","author":"H Psaier","year":"2011","unstructured":"Psaier, H., Dustdar, S.: A survey on self-healing systems: approaches and systems. Computing 91(1), 43\u201373 (2011)","journal-title":"Computing"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: Secure cryptography testbed implementation for SCADA protocols security. In: 2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 315\u2013320. IEEE, December 2013","DOI":"10.1109\/ACSAT.2013.69"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Shahzad, A., Xiong, N., Irfan, M., Lee, M., Hussain, S., Khaltar, B.: A SCADA intermediate simulation platform to enhance the system security. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 368\u2013373. IEEE, July 2015","DOI":"10.1109\/ICACT.2015.7224821"},{"key":"29_CR5","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-45402-2_18","volume-title":"Computer Science and its Applications","author":"BK Kim","year":"2015","unstructured":"Kim, B.K., Kang, D.H., Na, J.C., Chung, T.M.: Detecting abnormal behavior in SCADA networks using normal traffic pattern learning. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds.) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol. 330, pp. 121\u2013126. Springer, Heidelberg (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-662-45402-2_18"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Pramod, T.C., Sunitha, N.R.: An approach to detect malicious activities in SCADA systems. In: 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20137. IEEE, July 2013","DOI":"10.1109\/ICCCNT.2013.6726619"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Sousa, P., Bessani, A.N., Dantas, W.S., Souto, F., Correia, M., Neves, N.F.: Intrusion-tolerant self-healing devices for critical infrastructure protection. In: IEEE\/IFIP International Conference on Dependable Systems & Networks, DSN 2009, pp. 217\u2013222. IEEE, June 2009","DOI":"10.1109\/DSN.2009.5270333"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Hayes, G., El-Khatib, K.: Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. In: 2013 Third International Conference on Communications and Information Technology (ICCIT), pp. 179\u2013184. IEEE, June 2013","DOI":"10.1109\/ICCITechnology.2013.6579545"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Q., Abdelwahed, S.: Towards realizing self-protecting SCADA systems. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, pp. 105\u2013108. ACM, April 2014","DOI":"10.1145\/2602087.2602113"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Blangenois, J., Guemkam, G., Feltus, C., Khadraoui, D.: Organizational security architecture for critical infrastructure. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 316\u2013323. IEEE, September 2013","DOI":"10.1109\/ARES.2013.43"},{"issue":"4","key":"29_CR11","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1016\/j.dss.2006.06.011","volume":"42","author":"D Ghosh","year":"2007","unstructured":"Ghosh, D., Sharman, R., Raghav Rao, H., Upadhyaya, S.: Self-healing systems\u2014survey and synthesis. Decis. Support Syst. 42(4), 2164\u20132185 (2007)","journal-title":"Decis. Support Syst."},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Panja, B., Oros, J., Britton, J., Meharia, P., Pati, S.: Intelligent gateway for SCADA system security: a multi-layer attack prevention approach. In: 2015 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA), pp. 1\u20136. IEEE, June 2015","DOI":"10.1109\/CIVEMSA.2015.7158627"},{"issue":"4","key":"29_CR13","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10207-014-0254-9","volume":"14","author":"A Ameziane El Hassani","year":"2014","unstructured":"Ameziane El Hassani, A., Abou El Kalam, A., Bouhoula, A., Abbassi, R., Ait Ouahman, A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. 14(4), 369\u2013385 (2014). \n                    https:\/\/doi.org\/10.1007\/s10207-014-0254-9","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"29_CR14","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijcip.2009.08.005","volume":"2","author":"A Abou El Kalam","year":"2009","unstructured":"Abou El Kalam, A., Baina, A., Deswarte, Y., Kaaniche, M.: PolyOrBAC: a security framework for critical infrastructures. Int. J. Crit. Infrastruct. Prot. (IJCIP) 2(4), 154\u2013169 (2009). \n                    https:\/\/doi.org\/10.1016\/j.ijcip.2009.08.005","journal-title":"Int. J. Crit. Infrastruct. Prot. (IJCIP)"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85571-2_1","volume-title":"Architecting Dependable Systems V","author":"P Ver\u00edssimo","year":"2008","unstructured":"Ver\u00edssimo, P., Neves, Nuno F., Correia, M., Deswarte, Y., Abou El Kalam, A., Bondavalli, A., Daidone, A.: The CRUTIAL architecture for critical information infrastructures. In: de Lemos, R., Di Giandomenico, F., Gacek, C., Muccini, H., Vieira, M. (eds.) WADS 2007. LNCS, vol. 5135, pp. 1\u201327. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-85571-2_1"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.3845\/ree.2003.089","volume":"8","author":"Y Deswarte","year":"2003","unstructured":"Deswarte, Y.: Comment peut-on tol\u00e9rer les Intrusions sur Internet? Revue de l\u2019\u00e9lectricit\u00e9 et de l\u2019\u00e9lectronique 8, 83\u201390 (2003)","journal-title":"Revue de l\u2019\u00e9lectricit\u00e9 et de l\u2019\u00e9lectronique"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.ijcip.2008.08.003","volume":"1","author":"P Huitsing","year":"2008","unstructured":"Huitsing, P., Chandia, R., Papa, M., Shenoi, S.: Attack taxonomies for the modbus protocol. Int. J. Crit. Infrastruc. Prot. 1, 37\u201344 (2008)","journal-title":"Int. J. Crit. Infrastruc. Prot."},{"key":"29_CR18","unstructured":"Bhatia, S., et al.: Practical modbus flooding attack and detection. In: 2014 Proceedings of the ACSW-AISC, pp. 20\u201313 (2014)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T09:24:59Z","timestamp":1578475499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_29"}},"subtitle":["Short Paper"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRITIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Information Infrastructures Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"critis2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/critis2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}