Research Article
Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks
Table 1
Network protocol attacks.
| Attack type | Attacks |
| Host discovery | OS fingerprinting |
| Scan | TCP SYN/ACK scan TCP connect( ) scan TCP FIN stealth scan Xmas tree stealth scan TCP null stealth scan Windows scan RPC scan Version detection scan |
| DoS attack (Denial-of-service) | TCP/UDP flooding Smurf attack |
|
|