scispace - formally typeset
W

Wei Gao

Researcher at Mississippi State University

Publications -  7
Citations -  668

Wei Gao is an academic researcher from Mississippi State University. The author has contributed to research in topics: SCADA & Intrusion detection system. The author has an hindex of 5, co-authored 6 publications receiving 505 citations. Previous affiliations of Wei Gao include Siemens.

Papers
More filters
Proceedings ArticleDOI

On SCADA control system command and response injection and intrusion detection

TL;DR: A set of command injection, data injection, and denial of service attacks which leverage the lack of authentication in many common control system communication protocols including MODBUS, DNP3, and EtherNET/IP are developed.
Journal ArticleDOI

A control system testbed to validate critical infrastructure protection concepts

TL;DR: The testbed enables a research process in which cybersecurity vulnerabilities are discovered, exploits are used to understand the implications of the vulnerability on controlled physical processes, identified problems are classified by criticality and similarities in type and effect, and finally cybersecurity mitigations are developed and validated against within the testbed.
Book ChapterDOI

Industrial Control System Traffic Data Sets for Intrusion Detection Research

TL;DR: Four data sets are described, which include network traffic, process control and process measurement features from a set of 28 attacks against two laboratory-scale industrial control systems that use the MODBUS application layer protocol, which enable effective comparisons of intrusion detection solutions for SCADA systems.
Proceedings ArticleDOI

Industrial Control System Cyber Attacks

TL;DR: This paper presents a set of attacks against SCADA control systems, grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service.
Journal ArticleDOI

On Cyber Attacks and Signature Based Intrusion Detection for Modbus Based Industrial Control Systems

TL;DR: A set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis are described.