Architecture and Security of SCADA Systems: A Review

作者: Kolin Paul , Geeta Yadav

DOI: 10.1016/J.IJCIP.2021.100433

关键词:

摘要: … A short investigation of the current state of intrusion detection techniques in SCADA systems … Each vendor-specific SCADA protocol has its own rules and communication procedures, …

参考文章(138)
Ahmed Elgargouri, Mohammed Elmusrati, Analysis of Cyber-Attacks on IEC 61850 Networks advanced industrial conference on telecommunications. ,(2017) , 10.1109/ICAICT.2017.8686894
Luying Zhou, Huaqun Guo, Gelei Deng, A fog computing based approach to DDoS mitigation in IIoT systems Computers & Security. ,vol. 85, pp. 51- 62 ,(2019) , 10.1016/J.COSE.2019.04.017
Rakesh Kumar, Rinkaj Goyal, On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Computer Science Review. ,vol. 33, pp. 1- 48 ,(2019) , 10.1016/J.COSREV.2019.05.002
Amine Belqruch, Abdelilah Maach, SCADA security using SSH honeypot international conference on networking. pp. 2- ,(2019) , 10.1145/3320326.3320328
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah, RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid Proceedings 2019 Network and Distributed System Security Symposium. ,(2019) , 10.14722/NDSS.2019.23462
Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana, A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. network and distributed system security symposium. ,(2019) , 10.14722/NDSS.2019.23265
Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel, Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems EAI Endorsed Transactions on Security and Safety. ,vol. 6, pp. 159348- ,(2019) , 10.4108/EAI.25-1-2019.159348
Izhar Ahmed Khan, Dechang Pi, Zaheer Ullah Khan, Yasir Hussain, Asif Nawaz, HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems IEEE Access. ,vol. 7, pp. 89507- 89521 ,(2019) , 10.1109/ACCESS.2019.2925838
Tomas Kulik, Peter W. V. Tran-Jorgensen, Jalil Boudjadar, Compliance verification of a cyber security standard for Cloud-connected SCADA 2019 Global IoT Summit (GIoTS). pp. 1- 6 ,(2019) , 10.1109/GIOTS.2019.8766363
Hannah Snyder, Literature review as a research methodology: An overview and guidelines Journal of Business Research. ,vol. 104, pp. 333- 339 ,(2019) , 10.1016/J.JBUSRES.2019.07.039