Results 1 to 10 of about 20,641 (192)

Architecture and security of SCADA systems: A review [PDF]

open access: yesInternational Journal of Critical Infrastructure Protection, 2021
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System(ICS).
Geeta Yadav, Kolin Paul
exaly   +3 more sources

A Survey of Security in SCADA Networks: Current Issues and Future Challenges

open access: yesIEEE Access, 2019
Supervisory Control and Data Acquisition (SCADA) systems are used for monitoring industrial devices. However, their security faces the threat of being compromised due to the increasing use of open access networks.
Sagarika Ghosh, Srinivas Sampalli
doaj   +3 more sources

Keeping Host Sanity for Security of the SCADA Systems

open access: yesIEEE Access, 2020
Cyber attacks targeting the Supervisory Control and Data Acquisition (SCADA) systems are becoming more complex and more intelligent. Currently proposed security measures for the SCADA systems come under three categories: physical/logical network ...
Jae-Myeong Lee, Sugwon Hong
doaj   +3 more sources

Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study [PDF]

open access: yesSensors
The convergence of operational technology (OT) and information technology (IT) in industrial environments, such as water treatment plants, has significantly increased the attack surface of Supervisory Control and Data Acquisition (SCADA) systems ...
Ali Sayghe
doaj   +2 more sources

Non-local attention enhanced deep learning for robust cyberattack detection in industrial IoT-based SCADA systems [PDF]

open access: yesScientific Reports
Industrial Internet of Things (IIoT)-enabled Supervisory Control and Data Acquisition (SCADA) systems are pivotal for real-time monitoring and control in critical sectors like energy, manufacturing, and water management.
Mustafa Tahsin Yilmaz   +3 more
doaj   +2 more sources

Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems [PDF]

open access: yesSensors
Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in monitoring, managing, and controlling industrial processes, face flexibility, scalability, and management difficulties arising from traditional network structures ...
Onur Polat   +6 more
doaj   +2 more sources

A Survey of Security Challenges in Cloud-Based SCADA Systems

open access: yesComputers
Supervisory control and data acquisition (SCADA) systems enable industrial organizations to control and monitor real-time data and industrial processes.
Arwa Wali, Fatimah Alshehry
doaj   +3 more sources

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks

open access: yesIEEE Access, 2021
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive.
Abdul Basit Ajmal   +5 more
doaj   +1 more source

Analysis of ICS and SCADA Systems Attacks Using Honeypots

open access: yesFuture Internet, 2023
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations ...
Mohamed Mesbah   +3 more
doaj   +1 more source

A log mining approach for process monitoring in SCADA [PDF]

open access: yes, 2012
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano   +2 more
core   +10 more sources

Home - About - Disclaimer - Privacy