Literatura académica sobre el tema "IEC 60870-5-104"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "IEC 60870-5-104".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "IEC 60870-5-104"

1

Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.

Texto completo
Resumen
IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and infor
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Han, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Maulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.

Texto completo
Resumen
Abstract
 The success of SCADA and Defense Scheme system will take effect the operation of electric power system. However the two systems were stand alone in Java-Bali power system due to different development time and platform. At present in Java-Bali a modern Defense Scheme system is being built, that is called Adaptive Defense Scheme (ADS). ADS system has capability to communicate data between IEDs or relay, and between IEDs with ADS server. ADS server has also communication protocol such as IEC 60870-5-104. In a previous study it was found that the integration between two different sy
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Csatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.

Texto completo
Resumen
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual dev
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Qassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Qassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Durak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Feria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.

Texto completo
Resumen
<p style="margin: 0cm 0cm 0pt; text-align: justify; line-height: 150%;"><span style="color: black; line-height: 150%; font-family: 'Arial','sans-serif'; font-size: 12pt; mso-bidi-font-weight: bold;">Este artículo muestra los resultados del proceso de diseño, implementación y prueba de un algoritmo para hacer la translación de protocolo entre las normas IEC 60870-5-104 y MODBUS TCP/IP, éste modelo de algoritmos son de amplio uso en los procesos de supervisión y automatización en sub-estaciones eléctricas.</span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Arifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Texto completo
Resumen
Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature r
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "IEC 60870-5-104"

1

Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.

Texto completo
Resumen
This thesis is focused on testing of communication protocols IEC 60870-5-103 and IEC 60870-5-104. Theoretical part of the thesis describes basic principles, services and possibilities of both communication protocols. Practical part of the thesis deals with configuration of the IEC 60870-5-103 communication standard of protective terminal REF630. PCVDEW6 tool was used to test this communication protocol. Next part of the thesis is focused on convertion of the communication standard IEC 61850 to IEC 61870-5-104 using control system COM600. The testing of both communication protocols was carried
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Krejčír, Ľuboš. "Inteligentní systémy hromadného sběru dat v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219336.

Texto completo
Resumen
This paper is describing the issues of data collection in power distribution networks. It discusses the posibilities of data communication over wide area networks using the communication protocol IEC 60870-5-104, used in power distribution systems for transmission of information over IP networks. Thesis presents 4 technologies, suitable for data collection, with respect to the use of existing infrastructure of the utility. It focuses on design of appropriate data types in correspondence with used IEC 60870-5-104 protocol, and estimates the minimum data requirements for transmission, through pr
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Andersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.

Texto completo
Resumen
Industrial Control Systems (ICS) are an integral part of modernsociety, not least when it comes to controlling and protecting criticalinfrastructure such as power grids and water supply. There is a need to testthese systems for vulnerabilities, but it is often difficult if not impossible to doso in operational real time systems since they have been shown to be sensitiveeven to disturbances caused by benign diagnostic tools. This thesis exploreshow ICS field devices can be simulated in order to fool potential antagonists,and how they can be used in virtualized ICS for cyber security research. 8
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Fundin, August. "Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.

Texto completo
Resumen
This work deals security of SCADA industry systems which are used in energetic networks. It describes architecture of those systems and also analyze in details two communication protocols -- DNP3 and IEC 60870-5-104.  Next part is devoted to the analysis of anomaly and security threats which can be happen in SCADA systems. The main goal of this work is design and implementation of system which will be able to detect some of threats or anomalies. Also is necessary to propose simulation environment for testing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Beneš, Pavel. "Simulace komunikační části moderních průmyslových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413041.

Texto completo
Resumen
The thesis is focused on simulating of protocols from standard IEC 61850 in simulation tool OMNeT++. The theoretical part in the thesis deals with description of the field of operating technologies, supervisory control and data acquisition and protocols Tase-2/ICCP, IEC 61850, IEC 60870-5-104, DNP 3 and DLMS/COSEM. Next part deals with parameters influencing connection and description of simulation tools NS2/NS3, OPNET and OMNeT++. In the practical part there is created a network containing protocols from the standard IEC 61850 in the simulation program OMNeT++. Then in the network a end to en
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hošták, Viliam Samuel. "Učení se automatů pro rychlou detekci anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449296.

Texto completo
Resumen
The focus of this thesis is the fast network anomaly detection based on automata learning. It describes and compares several chosen automata learning algorithms including their adaptation for the learning of network characteristics. In this work, various network anomaly detection methods based on learned automata are proposed which can detect sequential as well as statistical anomalies in target communication. For this purpose, they utilize automata's mechanisms, their transformations, and statistical analysis. Proposed detection methods were implemented and evaluated using network traffic of
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jančová, Markéta. "Generická analýza toků v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417290.

Texto completo
Resumen
Tato práce se zabývá problematikou popisu síťového provozu pomocí automaticky vytvořeného modelu komunikace. Hlavním zaměřením jsou komunikace v řídicích systémech , které využívají speciální protokoly, jako je například IEC 60870-5-104 . V této práci představujeme metodu charakteristiky síťového provozu z pohledu obsahu komunikace i chování v čase. Tato metoda k popisu využívá deterministické konečné automaty , prefixové stromy  a analýzu opakovatelnosti. Ve druhé části této diplomové práce se zaměřujeme na implementaci programu, který je schopný na základě takového modelu komunikace verifiko
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

CHIU, YEN-MING, and 邱彥銘. "Implementation and Design of IEC 60870-5-104 and ARPv4 Fuzz Testing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/92ukj4.

Texto completo
Resumen
碩士<br>銘傳大學<br>資訊工程學系碩士班<br>106<br>This research and implementation are aim to use Fuzz testing method to unveil the potential known/unknown flaws(especially the 0-day vulnerabilities) in the industrial control system which is running IEC 60870-5-104 (IEC-104) and the network communication system using ARPv4. IEC-104 provides a communication profile over TCP/IP for sending telecontrol messages between a central station and individual outstations. Furthermore, the ARPv4 protocol is used to acquire the receiver’s MAC address by using its IP address. The fuzz testing program is based on Linux, an
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Yeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.

Texto completo
Resumen
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>107<br>Industrial Control system (ICS) and Supervisory Control and Data Acquisition (SCADA) system usually do not include security design in their design phase. With the growing demands of automation and remote monitoring, ICSs become more complex and have greater internet connectivity. As a result, the risk of hacking on industrial control networks also increases. Therefore, designing an effective intrusion detection system (IDS) for ICS has become an important issue. In this thesis, we design a honeypot to capture malicious packets of IEC 60870-5-104 protocol an
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "IEC 60870-5-104"

1

Holik, Filip, Doney Abraham, and Sule Yildirim Yayilgan. "Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10525-8_19.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Nguyen, Duc Duong, Manh Hung Do, Ngoc Thanh Pham, Van Dung Ngo, and Viet Phuong Pham. "Design Smart Factory Using RTDS and 800xA SCADA Based on IEC 60870-5-104." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90606-0_30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "IEC 60870-5-104"

1

He, Bangwei, Feng Wang, Jianxiu Li, et al. "Cyber Risk Detection for IEC 60870-5-104 Operation Commands in Distribution Systems." In 2025 2nd International Conference on Smart Grid and Artificial Intelligence (SGAI). IEEE, 2025. https://doi.org/10.1109/sgai64825.2025.11009438.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Radoglou-Grammatikis, Panagiotis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, and Emmanouil Panaousis. "Attacking IEC-60870-5-104 SCADA Systems." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00022.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ilgner, Petr, and Radek Fujdiak. "Fuzzing Framework for IEC 60870-5-104 Protocol." In CSSE 2022: 2022 5th International Conference on Computer Science and Software Engineering. ACM, 2022. http://dx.doi.org/10.1145/3569966.3570026.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Grammatikis, Panagiotis Radoglou, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Dimitrios Margounakis, Apostolos Tsiakalos, and Georgios Efstathopoulos. "An Anomaly Detection Mechanism for IEC 60870-5-104." In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). IEEE, 2020. http://dx.doi.org/10.1109/mocast49295.2020.9200285.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Hodo, Ersi, Stepan Grebeniuk, Henri Ruotsalainen, and Paul Tavolato. "Anomaly Detection for Simulated IEC-60870-5-104 Trafiic." In ARES '17: International Conference on Availability, Reliability and Security. ACM, 2017. http://dx.doi.org/10.1145/3098954.3103166.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Baiocco, Alessio, and Stephen D. Wolthusen. "Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard." In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2018. http://dx.doi.org/10.1109/isgteurope.2018.8571604.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Lin, Chih-Yuan, and Simin Nadjm-Tehrani. "Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3198458.3198460.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Yang, Y., K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang. "Stateful intrusion detection for IEC 60870-5-104 SCADA security." In 2014 IEEE Power & Energy Society General Meeting. IEEE, 2014. http://dx.doi.org/10.1109/pesgm.2014.6939218.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Grigoriou, Elisavet, Athanasios Liatifis, Panagiotis Radoglou Grammatikis, et al. "Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850329.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Cindrić, Ivan, and Tamara Hadjina. "An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication." In 2023 IEEE Belgrade PowerTech. IEEE, 2023. http://dx.doi.org/10.1109/powertech55446.2023.10202923.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!