Architecture and Security of SCADA Systems: A Review

作者: Kolin Paul , Geeta Yadav

DOI:

关键词:

摘要: Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, nuclear reactor disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System(ICS). systems have become essential part automated control and monitoring many the Critical Infrastructures (CI). Modern evolved from standalone into sophisticated complex, open systems, connected to Internet. This geographically distributed modern system is vulnerable threats cyber attacks. In this paper, we first review architectures that been proposed/implemented followed by attacks on such understand highlight evolving security needs for systems. A short investigation current state intrusion detection techniques done , a brief study testbeds The cloud Internet things (IoT) based are studied analysing architecture paper ends highlighting critical research problems need be resolved close gaps

参考文章(84)
Goreti Marreiros, Minkyu Choi, Rosslin John Robles, Zita Vale, Hoon Ko, Carlos Ramos, Utilization of different encryption schemes for securing SCADA component communication Information-an International Interdisciplinary Journal. ,vol. 16, pp. 1503- 1508 ,(2013)
Coordinatore del Dottorato, Carlo Bellettini, Ernesto Damiani, Julian L. Rrushi, Composite Intrusion Detection in Process Control Networks Università degli Studi di Milano. ,(2008) , 10.13130/RRUSHI-JULIAN_PHD2009-01
Shankar Sastry, Saurabh Amin, Alvaro A. Cárdenas, Research challenges for the security of control systems usenix security symposium. pp. 6- ,(2008)
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith, Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems international conference on critical infrastructure protection. pp. 31- 46 ,(2011) , 10.1007/978-3-642-24864-1_3
Chao-Rong Chen, Chi-Juin Chang, Cheng-Hung Lee, A time-driven and event-driven approach for substation feeder incident analysis International Journal of Electrical Power & Energy Systems. ,vol. 74, pp. 9- 15 ,(2016) , 10.1016/J.IJEPES.2015.07.017
Paul Oman, Matthew Phillips, Intrusion Detection and Event Monitoring in SCADA Networks international conference on critical infrastructure protection. pp. 161- 173 ,(2007) , 10.1007/978-0-387-75462-8_12
Joaquin Garcia, Fabien Autrel, Joan Borrell, Sergio Castillo, Frederic Cuppens, Guillermo Navarro, Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation international conference on information and communication security. pp. 223- 235 ,(2004) , 10.1007/978-3-540-30191-2_18
Jill Slay, Michael Miller, Lessons Learned from the Maroochy Water Breach international conference on critical infrastructure protection. pp. 73- 82 ,(2007) , 10.1007/978-0-387-75462-8_6