{"id":"https://openalex.org/W2982189679","doi":"https://doi.org/10.1145/3360664.3360675","title":"Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks","display_name":"Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks","publication_year":2019,"publication_date":"2019-10-23","ids":{"openalex":"https://openalex.org/W2982189679","doi":"https://doi.org/10.1145/3360664.3360675","mag":"2982189679"},"language":"en","primary_location":{"id":"doi:10.1145/3360664.3360675","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hdl.handle.net/10923/17576","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043611941","display_name":"Charles V. Neu","orcid":"https://orcid.org/0000-0003-3338-6651"},"institutions":[{"id":"https://openalex.org/I207417044","display_name":"Universidade de Santa Cruz do Sul","ror":"https://ror.org/04zayvt43","country_code":"BR","type":"education","lineage":["https://openalex.org/I207417044"]},{"id":"https://openalex.org/I45643870","display_name":"Pontif\u00edcia Universidade Cat\u00f3lica do Rio Grande do Sul","ror":"https://ror.org/025vmq686","country_code":"BR","type":"education","lineage":["https://openalex.org/I45643870"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Charles Varlei Neu","raw_affiliation_strings":["University of Santa Cruz do Sul, Santa Cruz do Sul, Brazil Pontifical, Catholic University of Rio Grande do, Sul, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"University of Santa Cruz do Sul, Santa Cruz do Sul, Brazil Pontifical, Catholic University of Rio Grande do, Sul, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I45643870","https://openalex.org/I207417044"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087836292","display_name":"Ina Schiering","orcid":"https://orcid.org/0000-0002-7864-5437"},"institutions":[{"id":"https://openalex.org/I2799859273","display_name":"Ostfalia University of Applied Sciences","ror":"https://ror.org/01bk10867","country_code":"DE","type":"education","lineage":["https://openalex.org/I2799859273"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ina Schiering","raw_affiliation_strings":["Ostfalia University of Applied Sciences, Wolfenbuttel, Germany"],"affiliations":[{"raw_affiliation_string":"Ostfalia University of Applied Sciences, Wolfenbuttel, Germany","institution_ids":["https://openalex.org/I2799859273"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048124867","display_name":"Avelino F. Zorzo","orcid":"https://orcid.org/0000-0002-0790-6759"},"institutions":[{"id":"https://openalex.org/I45643870","display_name":"Pontif\u00edcia Universidade Cat\u00f3lica do Rio Grande do Sul","ror":"https://ror.org/025vmq686","country_code":"BR","type":"education","lineage":["https://openalex.org/I45643870"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Avelino Zorzo","raw_affiliation_strings":["Pontifical Catholic University of Rio, Grande do Sul, Porto Alegre, Brazil"],"affiliations":[{"raw_affiliation_string":"Pontifical Catholic University of Rio, Grande do Sul, Porto Alegre, Brazil","institution_ids":["https://openalex.org/I45643870"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043611941"],"corresponding_institution_ids":["https://openalex.org/I207417044","https://openalex.org/I45643870"],"apc_list":null,"apc_paid":null,"fwci":1.5161,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.83412977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8258944749832153},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7757647633552551},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7359045743942261},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6935749053955078},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5483489632606506},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5437586903572083},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5324139595031738},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4745415151119232},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.47245243191719055},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42477476596832275},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.41804295778274536},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25645482540130615}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8258944749832153},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7757647633552551},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7359045743942261},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6935749053955078},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5483489632606506},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5437586903572083},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5324139595031738},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4745415151119232},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.47245243191719055},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42477476596832275},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.41804295778274536},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25645482540130615},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3360664.3360675","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3360664.3360675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third Central European Cybersecurity Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:repositorio.pucrs.br:10923/17576","is_oa":true,"landing_page_url":"https://hdl.handle.net/10923/17576","pdf_url":null,"source":{"id":"https://openalex.org/S4377196369","display_name":"PUCRS Repository (Pontifical Catholic University of Rio Grande do Sul)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45643870","host_organization_name":"Pontif\u00edcia Universidade Cat\u00f3lica do Rio Grande do Sul","host_organization_lineage":["https://openalex.org/I45643870"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conferenceObject"}],"best_oa_location":{"id":"pmh:oai:repositorio.pucrs.br:10923/17576","is_oa":true,"landing_page_url":"https://hdl.handle.net/10923/17576","pdf_url":null,"source":{"id":"https://openalex.org/S4377196369","display_name":"PUCRS Repository (Pontifical Catholic University of Rio Grande do Sul)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45643870","host_organization_name":"Pontif\u00edcia Universidade Cat\u00f3lica do Rio Grande do Sul","host_organization_lineage":["https://openalex.org/I45643870"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conferenceObject"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2839597615","display_name":null,"funder_award_id":"57417991","funder_id":"https://openalex.org/F4320320875","funder_display_name":"Deutscher Akademischer Austauschdienst"},{"id":"https://openalex.org/G3104305314","display_name":null,"funder_award_id":"465450/2014-8","funder_id":"https://openalex.org/F4320321091","funder_display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior"}],"funders":[{"id":"https://openalex.org/F4320320875","display_name":"Deutscher Akademischer Austauschdienst","ror":"https://ror.org/039djdh30"},{"id":"https://openalex.org/F4320321091","display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","ror":"https://ror.org/00x0ma614"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1520670086","https://openalex.org/W2012446724","https://openalex.org/W2021138621","https://openalex.org/W2036057524","https://openalex.org/W2038194220","https://openalex.org/W2044880677","https://openalex.org/W2065955975","https://openalex.org/W2072641892","https://openalex.org/W2082550445","https://openalex.org/W2157536286","https://openalex.org/W2472963837","https://openalex.org/W2772805705","https://openalex.org/W2787083103","https://openalex.org/W2805611890","https://openalex.org/W2810891916","https://openalex.org/W2963065250","https://openalex.org/W3017312168","https://openalex.org/W4253067163"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W4239662759","https://openalex.org/W2471811227","https://openalex.org/W2039821316","https://openalex.org/W2388081684"],"abstract_inverted_index":{"The":[0],"usage":[1],"of":[2,10,109,118,121,138,162],"machine":[3,5],"to":[4,75,98,129],"communication":[6,60],"and":[7,40,58,61,126,153],"Industrial":[8],"Internet":[9],"Things":[11],"is":[12,52,106,124,133,164],"increasing":[13],"nowadays,":[14],"in":[15,17,112,135],"particular":[16],"industry":[18],"environments.":[19],"Devices":[20],"with":[21],"low":[22],"hardware":[23,96],"capabilities":[24],"may":[25,71,82,148],"e.g.":[26],"be":[27,73,99,155],"used":[28],"for":[29,32,45],"sensing":[30],"data,":[31],"example,":[33],"on":[34,107],"an":[35,69,127],"industrial":[36],"network.":[37],"Specific":[38],"protocols":[39],"frameworks":[41],"were":[42],"being":[43],"developed":[44],"these":[46],"use":[47],"cases.":[48],"One":[49],"such":[50,131,146],"framework":[51],"OPC":[53,113],"UA,":[54],"which":[55],"allows":[56],"signed":[57],"encrypted":[59,91],"therefore":[62],"addresses":[63],"already":[64],"important":[65],"security":[66,84],"requirements.":[67],"However,":[68],"attacker":[70],"also":[72],"able":[74],"encrypt":[76],"malicious":[77],"packets":[78,92],"so":[79],"that":[80],"it":[81],"bypass":[83],"systems":[85],"and/or":[86],"empower":[87],"the":[88,104,136],"attack,":[89],"as":[90],"typically":[93],"need":[94],"more":[95],"consumption":[97,152],"handled.":[100],"In":[101],"this":[102],"paper":[103],"focus":[105],"Denial":[108,120],"Service":[110,122],"attacks":[111,123,132,147],"UA":[114],"networks.":[115],"An":[116],"analysis":[117],"possible":[119],"presented":[125],"approach":[128],"detect":[130],"implemented":[134],"context":[137],"a":[139,159],"simulation":[140],"scenario.":[141],"Our":[142],"evaluations":[143],"show":[144],"how":[145],"affect":[149],"server":[150],"CPU":[151],"could":[154],"very":[156],"powerful":[157],"when":[158],"large":[160],"number":[161],"devices":[163],"compromised.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
