{"584406":{"#nid":"584406","#data":{"type":"event","title":"Ph.D. Proposal Oral Exam - David Formby","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle:\u0026nbsp; \u003C\/strong\u003E\u003Cem\u003ENetwork based Fingerprinting Techniques for Industrial Control Systems\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ECommittee:\u0026nbsp; \u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Beyah, Advisor\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Owen, Chair\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Copeland\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract: \u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe objective of the proposed research is to develop novel fingerprinting-based intrusion detection techniques that leverage the unique timing aspects of industrial control systems, both physical and in software. Industrial control systems present a unique set of security challenges due to legacy equipment and real-time system requirements preventing regular patching and the capability for cryptographic protocols. Therefore, minimally invasive intrusion detection and fingerprinting techniques must be used to secure these systems where compromises can lead to catastrophic physical damage. First, network traffic from live power distribution substations will be extensively studied and characterized, which will guide the development of the proposed fingerprinting techniques. Then, physical fingerprinting techniques proposed in previous work will be extended to a more general application by removing several limiting assumptions about the network architecture and capabilities of the end devices. Finally, timing based fingerprinting methods will be developed to detect when user applications on programmable logic controllers have been modified through both accidental and malicious means.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Network based Fingerprinting Techniques for Industrial Control Systems"}],"uid":"28475","created_gmt":"2016-11-30 07:51:38","changed_gmt":"2016-11-30 07:51:38","author":"Daniela Staiculescu","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2016-12-07T12:00:00-05:00","event_time_end":"2016-12-07T14:00:00-05:00","event_time_end_last":"2016-12-07T14:00:00-05:00","gmt_time_start":"2016-12-07 17:00:00","gmt_time_end":"2016-12-07 19:00:00","gmt_time_end_last":"2016-12-07 19:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"434371","name":"ECE Ph.D. Proposal Oral Exams"}],"categories":[],"keywords":[{"id":"102851","name":"Phd proposal"},{"id":"1808","name":"graduate students"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78771","name":"Public"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}