Skip to search formSkip to main contentSkip to account menu

Scapy

Scapy is a packet manipulation tool for computer networks, written in Python by Philippe Biondi. It can forge or decode packets, send them on the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Enterprise networks' firewalls are rarely set up in a shared-protection (N:1) configuration, preferring instead the more costly… 
2018
2018
With the advent of research on fast path packet processing, traffic generator tools witnessed many entrants with features ranging… 
2018
2018
The proliferation of privately-owned Unmanned Aerial Vehicles (UAVs) and the associated potential risks they pose to personal… 
Review
2018
Review
2018
Controller Area Network (CAN) is still the most used network technology in today’s connected cars. Now and in the near future… 
2017
2017
A free and open source programming Language which is not only reliable and stable but can also implement wide range of… 
2015
2014
2014
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-­‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-­‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-­‐12 Documents .................................................................................................. 20 
2012
2012
2012
When Internet Protocol (IP) packets travel across networks, they must meet size requirements defined in the network’s Maximum…