<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giuseppe Bernieri</string-name>
          <email>gbernieri@uniroma3.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Federica Pascucci</string-name>
          <email>fpascucci@uniroma3.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Javier Lopez</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Engineering University “Roma Tre”</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Network, Information and Computer Security Lab University of Malaga</institution>
          ,
          <addr-line>29071 Malaga</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <fpage>116</fpage>
      <lpage>125</lpage>
      <abstract>
        <p>In this paper, a highly-configurable network anomaly detection system for Critical Infrastructure scenarios is presented. The Mininet virtual machine environment has been used in this framework to simulate an Industrial Control System network and to replicate both physical and cyber components. Finally, a cyber-attack has been implemented for showing both the effectiveness and capability of the proposed network security system.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>Related</title>
    </sec>
    <sec id="sec-3">
      <title>Work</title>
      <p>
        In literature, different approaches have been proposed for network anomaly detection. A first
review of anomaly-based IDSs considering the different methodologies applied in generic
communication systems has been proposed in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] an analysis of most important anomaly-based
IDSs is performed: the Authors propose a taxonomy based on four categories: classification,
statistical, clustering, and information theory.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] the Authors extend the Snort [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] signature-based IDS by including a preprocessor
for anomaly-based detection. A statistical model of the regular traffic is generated by the
anomaly-based IDS for detecting deviations from the nominal behaviour. In particular, a
campus network traffic is considered. However, no cyber-attacks or industrial control networks are
taken into account. In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] an anomaly-based IDS is proposed considering message repetition
and timing information. The Authors exploit data coming from real ICS networks; however
they were not able to apply the proposed approach to datasets containing malicious traffic.
The authors limit their work to a discussion on general cyber-attacks without performing
experimental validation. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the Authors present an anomaly detection system designed to
identify irregular deviations in SCADA control register values. The used approach is based on
the analysis of real Modbus over Transmission Control Protocol (TCP) traffic collected from
SCADA system. No attacks are present against the system network and only the false alert
rate is evaluated. In [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] a behaviour-based IDS for Smart Grid based on the IEC 61850
protocol is presented. The Authors adopt real network traffic data captured from South Korean
digital substation environment. An auto-associative kernel regression model coupled with the
Statistical Probability Ratio Test is used in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. A payload analysis method is proposed in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]
where the Bro [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] security monitor is used as network sensor.
      </p>
      <p>The aim of this contribution is to provide an ADS and validate it in a simulation
environment. Specifically, a CI SCADA networked system is simulated and the proposed tool is tested
under a cyber-attack. The added value is represented by the flexibility of the proposed detection
scheme. In this paper, preliminary results are presented in the framework of Cyber-Physical
security for CI scenarios.
3</p>
    </sec>
    <sec id="sec-4">
      <title>SCADA system architecture for Mininet simulation</title>
      <p>One of the novelties of this paper is represented by the use of Mininet for the simulation
of CIs networks. Mininet is a virtual network running on a single machine used for generic
communication system simulations and it represents a useful tool for research and development
in the cyber domain. With the Mininet Virtual Machine (VM) it is possible to simulate multiple
nodes on a network and connect them with virtual links and switches. Every node simulates
a stand-alone machine with own network features. Moreover, Mininet is useful to develop and
simulate Software-Defined Networking (SDN) systems, an attractive architecture that allows
to handle network services in a flexible and dynamic way. The versatility of Mininet grants
to simulate complex network systems, using several communication protocols. The peculiar
features of the nodes connected to the network are developed in python scripting and all the
tools installed on the Mininet host can be used by the simulated network nodes.</p>
      <p>In Fig. 1 the implemented SCADA architecture is shown. Each component of the
architecture is simulated by network nodes on the Mininet VM. In the SCADA system scenario,
the Field Layer is represented by the physical process and the Programmable Logic Controller
(PLC). The latter is connected to the water level sensors for read operations and it
communicates with the Control Center by a Local Area Network (LAN). The Control Center is composed
by a Human Machine Interface (HMI) and Monitors. This simple architecture has been
designed to verify effectiveness of Mininet in simulating a SCADA system. According to this
approach, more complex networked ICSs can be considered. It is worth to highlight that inside
a network node it is possible to simulate physical processes in order to emulate the Field Layer
of a SCADA system.
4</p>
    </sec>
    <sec id="sec-5">
      <title>Case study: water tower simulation</title>
      <p>
        In this paper, a water tower system has been simulated using Mininet VM. In [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19">16, 17, 18, 19</xref>
        ]
the Authors exploit water distribution system testbeds to design cyber security solutions and
physical faults detection strategies. In this work, the same approach has been considered.
      </p>
      <p>A water tower is a structure located in an elevated place to provide potable water to
costumers. This infrastructure is able to provide water also in emergency situation, e.g. without
electric energy, since its operation is based on gravity. The system simulation is represented by
filling up and emptying the tank according to physical laws (i.e., the law of conservation of mass
and the Torricelli law). In Fig. 2, a simplified water tower is shown. The relation describing
the process of filling up and emptying the tank are</p>
      <p>A h˙(t) = QIN − QOUT</p>
      <p>QOUT = ap2gh(t)
h˙(t) =</p>
      <p>QIN</p>
      <p>A −
ap2gh(t)</p>
      <p>A
(1)
(2)
(3)
where QIN and QOUT are the incoming and outgoing flows, m3/s; A and a are respectively the
tank and output hole sections; h(t) represents the water level and g is the gravity acceleration.
The model of the system has been created using MATLAB/Simulink (see Fig. 3) and later
ported into the Mininet virtual machine using python scripting.</p>
      <p>
        In order to reproduce the behaviour of a CI scenario, a SCADA system has been considered
as monitoring and control architecture for the simulated water system. With the exception of
analogues reads simulated inside the PLC node, all the communications between the nodes have
been implemented using the Modbus over TCP [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The Modbus/TCP has been selected and
implemented for the communication routines to create a more realistic simulation. The Modbus
is widely used as network protocol in the industrial manufacturing environments. In its version
that involves the use of TCP, it is possible to take advantage of the easy implementation.
5
      </p>
    </sec>
    <sec id="sec-6">
      <title>Anomaly Detection System (ADS)</title>
      <p>There are many different tools allowing security solutions on networks. However, in the
framework of ICS and networked CIs, the classic cyber security methods, adopted in IT, do not
represent an ideal solution. Signature-based IDSs, for example, perform a safety check of the
traffic based on static rules but are not able to identify a Zero-Day attack since they do not
consider a dynamic analysis of the network. The Zero-Day attacks, indeed, are cyber-threats that
take advantage of vulnerabilities that are not yet identified and represent the highest threat for
ICSs. This kind of attacks can be identified by analysing the behaviour of the network that in
the case of CIs is repetitive, according to the processes that are carried out (e.g., read sensors,
send commands to actuators, etc.): this represents an advantage in terms of anomalies analysis
on the network. Unlike traditional IDSs that integrate the entire identification module in a
single tool, the ADS presented in this paper includes the following components, as shown in
Fig. 4:
• Network Analyser Component (NAC): this component analyses and filters the network
traffic in order to save the packets of interest into a Packet Capture file (PCAP file) for
a predefined period. This module is executed in a nominal condition without undergoing
attacks or anomalous situations. Multiple PCAP files of the same operations are stored to
better determine the normal behaviour patterns. The time required depends on the period
of the system. For example, if control operations of a production chain are repeated daily,
it will be necessary to save the 24-hour network behaviour. In a similar way, for a water
CI system, if cyclic monitoring and control operations that last one week are identified, it
will be necessary to save the network traffic for a week to evaluate the normal behaviour;
• Network Profile Generator (NPG): this component uses the network traffic saved by the
NAC to generate a profile of the normal network behaviour. The way in which the profile
is generated represents the most important aspect of the anomaly detection fulfilment.
The more accurate the model, the more it will be possible to identify system faults on the
network traffic. In contrast to the anomaly detection tools presented in the literature, the
NPG strength is represented by configuration possibilities: this allows to easily adapt the
proposed system to any network for the anomalies analysis. Moreover, this module can
extract necessary data from the network traffic, in particular, it is possible to select any
traffic characteristic of the protocol under analysis in order to provide ad hoc anomaly
detection solutions. This feature represents a valuable option for CI security research
scenarios due to the adaptability requirements. The NPG input are the PCAP files and
the output is a Comma Separated Values (CSV) file containing the network profile data;
• Anomaly Detection Engine (ADE): once the creation of the network profile is completed,
this is used for the anomaly detection active task. The ADE analyses the traffic and
compares it at regular intervals with the set of parameters generated from the NPG. The
ADE generates an alert when:
η(i) &gt; η?(i) + δ(i)
(4)
where: η(i) is the i-th value of the parameter considered for anomaly detection derived
from the analysis of the actual network traffic, η?(i) represents the i-th value of the relative
parameter stored in the profile file, whereas δ(i) is an uncertainty value chosen to mitigate
false detection probability. The inputs of this component are the CSV profile file and the
up-to-date network traffic. The outputs are the alerts displayed on the monitor for the
security human operator, which simultaneously are saved into a log file.</p>
      <p>The NAC and the NPG modules run before ADE, however it is possible to regenerate the
PCAP file and the CSV file, whenever necessary to update the profile of the network.
6</p>
    </sec>
    <sec id="sec-7">
      <title>Experimental set-up and results</title>
      <p>In this section the experimental set-up of Mininet VM used for the simulation of a physical CI
process is presented. The ADS for the anomalies analysis is deployed in this network and the
results of anomaly detection active phase are evaluated during a cyber-attack.</p>
      <p>The network topology, including the attacker, is shown in Fig. 5. The network is composed
by PLC, configured as Modbus/TCP Server, two Monitors set as Modbus/TCP Clients, and a
legacy switch enabling the communications among nodes. The ADS has been implemented on
the Mininet host of the VM to analyse traffic without being part of the network. A network
security analyser connected to the mirroring port of a switch has been simulated.</p>
      <p>Concerning the physical process, introduced in Sec. 4, the following parameters have been
set: QIN = 10 m3/s, A = 20 m2, a = 0.5 m2. The simulation lasts 60 s and it is depicted in
Fig. 6.</p>
      <p>Concerning the network communications for this experiment, only the water level of the tank
is monitored: to this end, industrial level sensors in the field layer are connected to the PLC,
which controls the data. The PLC polls every second the value of the level sensor and forwards</p>
      <sec id="sec-7-1">
        <title>Simulation Description</title>
        <p>PLC Server starts simulating sensor values read operations
Monitor 1 starts querying PLC for Read Input Registers data
Monitor 2 starts querying PLC for Read Input Registers data
Simulation Ends</p>
      </sec>
      <sec id="sec-7-2">
        <title>Simulation Description</title>
        <p>PLC Server starts simulating sensor values read operations
Monitor 1 starts querying PLC for Read Input Registers data
Attacker starts SYN Flood attack against the PLC
Monitor 2 starts querying PLC for Read Input Registers data</p>
        <p>Simulation Ends
them to the Monitors by using Modbus/TCP protocol. Therefore, every second the Clients
send a query to the Server in order to receive the sensor reads. The Modbus Function Code
implemented for the Query/Response operations is the Read Input Registers. As previously
mentioned, the various components of the ADS need to be configured taking into account the
particular system at hand. For this experiment, the analysing period of the NAC module is
equal to the operating period (t = 60 s).</p>
        <p>The NPG configuration is the most critical part of the implementation: the parameters to be
used for profiling the network need to be carefully chosen. For this experiment, the following
parameters have been selected: Packet Timestamp, Read Input Register Query, Read Input
Register Response, Total Modbus Packets, Total Packets. Subsequently, it has been decided to
create a reference to the normal behaviour of the network considering every second of traffic
analysed. In this way, n = 60 entries for the network traffic profile file have been generated with
information on the parameters described above. Once the profile file has been created, the ADE
is activated: it analyses every second of the network traffic and the parameters data taken into
account are compared with those generated by the NPG module. For this experimental phase,
a δ = 2 constant value has been chosen by considering the standard deviation of 10 nominal
runs.</p>
        <p>
          In order to assess the experimental behaviour of the ADS, cyber-attacks on the experimental
network have been carried out to verify the effectiveness of the cyber security system. It is
assumed that the attacker has succeeded to gain access to the network so he is connected
as a normal node. The SYN Flood Attack has been considered: this cyber-attack represents
a Denial-of-Service (DoS) method that exploits the TCP three-way handshake mechanism.
Flooding TCP segments to a Server causes the SYN-RECEIVED state to reach the maximum
admissible value. In this way, the legitimate clients are not able to connect to the server and
this provokes a DoS behaviour [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. The periodic simulation steps are described in the Tables 1
and 2. The two Monitors start communications at different times and the SYN Flood Attack
attempts to avoid the initialisation of new connections between Client and Server, specifically
the attacker aims to disconnect Monitor 2 from the Server.
        </p>
        <p>In Fig. 7 the SCADA network simulated traffic in nominal conditions is depicted. The
blue line represents the packet captured over the time and the red line represents the profile
dynamics generated by NPG. The Total Packets parameter is considered for this experiment.
As shown, at t = 30 s, the Monitor 2 starts to query the Server and the network detects twice
the number of packets/seconds.</p>
        <p>Once the network data acquisition and profile generation stages are completed, the ADE is
activated and starts to compare the actual network traffic with the profile previously created.
In Fig. 8, the network traffic of the system under attack is represented. As it can be seen from
the graph, at t = 20 s the cyber-attack starts and the actual network traffic exceeds the ADE
security thresholds. The ADE module, indeed, compares the traffic every second and generates
alerts along the whole period of attack. When the attack ends (t = 40 s), the traffic analysed
drops below the ADE threshold.
7</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Conclusions and future works</title>
      <p>In this paper, a network ADS designed for Critical Infrastructure scenarios is presented. This
kind of tools generates a dynamic profile of the network and are able to identify cyber Zero-Day
attacks. For the development and testing phase, Mininet VM environment has been adopted
and it has been proved that industrial networks can be simulated by this software. Some
preliminary results on the effectiveness of ADS under a cyber-attack have been presented.</p>
      <p>The tool proposed in this paper can be regarded as a starting point for the development
of advanced cyber-physical protection systems, that are able to exploit classical fault detection
approaches and network cyber security techniques. At the same time, it is possible to analyse
the physical processes through the network and the ADS can integrate or even replace the
classical fault detection tools available in the literature.</p>
      <p>The aim of this paper is to present preliminary results to validate the proposed
architecture; hence, the setup considered here is too simple to provide insights on the impact of false
positive/false negatives. Future work will be devoted to validate this scheme in a more
complex environment so to analyse false positive and false negative reactions. Moreover, adaptive
profiling methodologies will be used in the NPG module. Finally, software defined network will
be adopted to implement software defined security.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Falliere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.O.</given-names>
            <surname>Murchu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E. Chien. W32. Stuxnet</given-names>
            <surname>Dossier</surname>
          </string-name>
          .
          <source>Technical Report 1</source>
          .4,
          <string-name>
            <surname>Symantec</surname>
          </string-name>
          ,
          <year>February 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Symantec</given-names>
            <surname>Security Response. W32</surname>
          </string-name>
          .
          <article-title>Duqu - The Precursor to the Next Stuxnet</article-title>
          .
          <source>Technical Report 1</source>
          .4,
          <string-name>
            <surname>November</surname>
          </string-name>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Slay</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Miller</surname>
          </string-name>
          .
          <article-title>Lessons Learned from the Maroochy Water Breach</article-title>
          , volume
          <volume>253</volume>
          <source>of IFIP</source>
          , chapter
          <string-name>
            <surname>Critical Infrastructure Protection - Part</surname>
            <given-names>II</given-names>
          </string-name>
          , pages
          <fpage>73</fpage>
          -
          <lpage>82</lpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] SANS and E-ISAC</article-title>
          .
          <article-title>Analysis of the Cyber Attack on the Ukrainian Power Grid</article-title>
          .
          <source>Technical report</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Mininet</surname>
          </string-name>
          ,
          <article-title>An Instant Virtual Network on your Laptop (or other PC), www</article-title>
          .mininet.org.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Jyothsna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Rama Prasad</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K. Munivara</given-names>
            <surname>Prasad</surname>
          </string-name>
          .
          <article-title>A review of anomaly based intrusion detection systems</article-title>
          .
          <source>International Journal of Computer Applications</source>
          ,
          <volume>28</volume>
          (
          <issue>7</issue>
          ):
          <fpage>26</fpage>
          -
          <lpage>35</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Mahmood</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Hu</surname>
          </string-name>
          .
          <article-title>A survey of network anomaly detection techniques</article-title>
          .
          <source>Journal of Network and Computer Applications</source>
          ,
          <volume>60</volume>
          :
          <fpage>19</fpage>
          -
          <lpage>31</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Szmit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Szmit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Adamus</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Bugala</surname>
          </string-name>
          .
          <article-title>Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling</article-title>
          and
          <string-name>
            <given-names>Anomaly</given-names>
            <surname>Detection</surname>
          </string-name>
          . Informatica,
          <volume>36</volume>
          (
          <issue>4</issue>
          ),
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Roesch</surname>
          </string-name>
          et al.
          <article-title>Snort: Lightweight Intrusion Detection for Networks</article-title>
          .
          <source>In LISA</source>
          , volume
          <volume>99</volume>
          , pages
          <fpage>229</fpage>
          -
          <lpage>238</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>R. R. R.</given-names>
            <surname>Barbosa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sadre</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Pras</surname>
          </string-name>
          .
          <article-title>Exploiting traffic periodicity in industrial control networks</article-title>
          .
          <source>International journal of critical infrastructure protection</source>
          ,
          <volume>13</volume>
          :
          <fpage>52</fpage>
          -
          <lpage>62</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N.</given-names>
            <surname>Erez</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Wool</surname>
          </string-name>
          .
          <article-title>Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems</article-title>
          .
          <source>International Journal of Critical Infrastructure Protection</source>
          ,
          <volume>10</volume>
          :
          <fpage>59</fpage>
          -
          <lpage>70</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. H.</given-names>
            <surname>Lim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. I.</given-names>
            <surname>Lim</surname>
          </string-name>
          .
          <article-title>A behavior-based intrusion detection technique for smart grid infrastructure</article-title>
          .
          <source>In PowerTech</source>
          , 2015 IEEE Eindhoven, pages
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Usynin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Hines</surname>
          </string-name>
          .
          <article-title>Anomaly-based intrusion detection for SCADA systems</article-title>
          . In 5th intl.
          <article-title>topical meeting on nuclear plant instrumentation, control and human machine interface technologies</article-title>
          <source>(npic&amp;hmit 05)</source>
          , pages
          <fpage>12</fpage>
          -
          <lpage>16</lpage>
          . Citeseer,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Du</surname>
          </string-name>
          ¨ssel, C. Gehl,
          <string-name>
            <given-names>P.</given-names>
            <surname>Laskov</surname>
          </string-name>
          , J.-U. Bußer,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Sto¨rmann, and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Ka</surname>
          </string-name>
          <article-title>¨stner. Cyber-critical infrastructure protection using real-time payload-based anomaly detection</article-title>
          .
          <source>In International Workshop on Critical Information Infrastructures Security</source>
          , pages
          <fpage>85</fpage>
          -
          <lpage>97</lpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>IDS</given-names>
            <surname>Bro</surname>
          </string-name>
          . Homepage: http://www.bro-ids.org.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>E. E.</given-names>
            <surname>Miciolino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pascucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lopez</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.M. Polycarpou</surname>
            , and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Setola</surname>
          </string-name>
          .
          <article-title>FACIES: a Testbed for Distributed Fault and Attack Identification in Interdependent Critical Infrastructures</article-title>
          . In 2nd International SCADALab Workshop, Seville (Spain),
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>E. E.</given-names>
            <surname>Miciolino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Bernieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pascucci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Setola</surname>
          </string-name>
          .
          <article-title>Communications network analysis in a SCADA system testbed under cyber-attacks</article-title>
          .
          <source>In Telecommunications Forum Telfor (TELFOR)</source>
          ,
          <year>2015</year>
          23rd, pages
          <fpage>341</fpage>
          -
          <lpage>344</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Heracleous</surname>
          </string-name>
          , E. Etchev´es Miciolino,
          <string-name>
            <given-names>R.</given-names>
            <surname>Setola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pascucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.G.</given-names>
            <surname>Eliades</surname>
          </string-name>
          , G. Ellinas,
          <string-name>
            <given-names>C.G.</given-names>
            <surname>Panayiotou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.M.</given-names>
            <surname>Polycarpou</surname>
          </string-name>
          .
          <article-title>Critical Infrastructure Online Fault Detection: Application in Water Supply Systems</article-title>
          .
          <source>In 9th CRITIS Conference</source>
          ,
          <source>Limassol (Cyprus)</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bernieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Del Moro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Faramondi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Pascucci</surname>
          </string-name>
          .
          <article-title>A Testbed for Integrated Fault Diagnosis and Cyber Security Investigation</article-title>
          .
          <source>In 3rd International Conference on Control, Decision and Information Technologies</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Modbus</surname>
            <given-names>Organization</given-names>
          </string-name>
          <string-name>
            <surname>Inc</surname>
          </string-name>
          . Modbus Messaging on TCP/IP Implementation Guide v.
          <volume>1</volume>
          .0b,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W. M.</given-names>
            <surname>Eddy. SYN Flood</surname>
          </string-name>
          <article-title>Attack</article-title>
          .
          <source>In Encyclopedia of Cryptography and Security</source>
          , pages
          <fpage>1273</fpage>
          -
          <lpage>1274</lpage>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>