Research Article

ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System

Figure 2

Communication procedure of the S7 protocol.