Journal of Applied Mathematics / 2014 / Article / Tab 1

Research Article

Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

Table 1

Network protocol attacks.

Attack typeAttacks

Host discoveryOS fingerprinting

ScanTCP SYN/ACK scan
TCP connect( ) scan
TCP FIN stealth scan
Xmas tree stealth scan
TCP null stealth scan
Windows scan
RPC scan
Version detection scan

DoS attack
(Denial-of-service)
TCP/UDP flooding
Smurf attack

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.