{"id":"https://openalex.org/W1620265354","doi":"https://doi.org/10.1109/icacci.2015.7275694","title":"Detecting the network attack vectors on SCADA systems","display_name":"Detecting the network attack vectors on SCADA systems","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1620265354","doi":"https://doi.org/10.1109/icacci.2015.7275694","mag":"1620265354"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068339630","display_name":"Ram Sandesh Ramachandruni","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ram Sandesh Ramachandruni","raw_affiliation_strings":["Amrita Centre for Cyber Security Amrita Vishwa Vidyapeetham Amritapuri, Kerala, India","Amrita Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Amrita Centre for Cyber Security Amrita Vishwa Vidyapeetham Amritapuri, Kerala, India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Amrita Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029900047","display_name":"Prabaharan Poornachandran","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prabaharan Poornachandran","raw_affiliation_strings":["Amrita Centre for Cyber Security Amrita Vishwa Vidyapeetham Amritapuri, Kerala, India","Amrita Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Amrita Centre for Cyber Security Amrita Vishwa Vidyapeetham Amritapuri, Kerala, India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Amrita Centre for Cyber Security, Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068339630"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":1.3313,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82519314,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"707","last_page":"712"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.9819374084472656},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9279814958572388},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7886892557144165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5683947801589966},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5181721448898315},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5111387372016907},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4434438943862915},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2381133735179901},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09486913681030273}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.9819374084472656},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9279814958572388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7886892557144165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5683947801589966},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5181721448898315},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5111387372016907},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4434438943862915},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2381133735179901},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09486913681030273},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275694","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275694","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W314543367","https://openalex.org/W1573594453","https://openalex.org/W2106925367","https://openalex.org/W2118131149","https://openalex.org/W2122959005","https://openalex.org/W2162783010","https://openalex.org/W2619874920","https://openalex.org/W6610964773"],"related_works":["https://openalex.org/W2789663798","https://openalex.org/W2552542906","https://openalex.org/W2265199518","https://openalex.org/W2215365983","https://openalex.org/W2995370509","https://openalex.org/W2184855233","https://openalex.org/W2198908836","https://openalex.org/W2060479059","https://openalex.org/W2494895348","https://openalex.org/W4229698505"],"abstract_inverted_index":{"Currently":[0],"critical":[1,36],"infrastructures":[2],"such":[3],"as":[4,59],"SCADA":[5,30,71,104,124,165],"systems":[6,44,96],"are":[7,65],"increasingly":[8],"under":[9],"threat,":[10],"they":[11],"often":[12],"go":[13],"unreported.":[14],"There":[15],"is":[16,34,75,128,154],"a":[17,54],"great":[18],"need":[19],"in":[20,97,119],"addressing":[21],"them.":[22],"Today":[23],"majority":[24],"of":[25,94,134],"the":[26,50,81,92,99,132,140,149,157],"industries":[27],"use":[28,93],"these":[29,39,43,84],"systems,":[31],"so":[32],"it":[33,74],"very":[35,66],"to":[37,49,56,69,77,130,139,155,163],"protect":[38],"systems.":[40,85,105,125],"Attack":[41],"on":[42,83,103],"could":[45],"cause":[46],"serious":[47],"damage":[48],"infrastructure":[51],"and":[52,111,147,160],"sometimes":[53],"threat":[55],"human":[57],"life":[58],"well.":[60],"As":[61],"per":[62],"date":[63],"there":[64],"few":[67],"solutions":[68],"address":[70],"security.":[72],"So,":[73],"important":[76],"take":[78],"countermeasures":[79],"against":[80],"attacks":[82],"In":[86],"this":[87],"paper":[88],"we":[89],"will":[90,107],"analyze":[91],"honeypot":[95,114],"detecting":[98],"network":[100],"attack":[101],"vectors":[102],"We":[106],"start":[108],"by":[109],"analyzing":[110],"testing":[112],"various":[113],"features":[115],"which":[116],"can":[117],"help":[118],"providing":[120],"additional":[121],"security":[122],"for":[123,145],"A":[126],"Honeypot":[127],"built":[129],"mimic":[131],"services":[133],"an":[135],"ICS;":[136],"exposing":[137],"them":[138,143],"Internet,":[141],"making":[142],"attractive":[144],"attackers":[146,150],"monitor":[148],"activities.":[151],"The":[152],"goal":[153],"model":[156],"attacking":[158],"methodologies":[159],"suggest":[161],"recommendations":[162],"make":[164],"system":[166],"secure.":[167]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
