Architecture and security of SCADA systems: A review [PDF]
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System(ICS).
Geeta Yadav, Kolin Paul
exaly +3 more sources
A Survey of Security in SCADA Networks: Current Issues and Future Challenges
Supervisory Control and Data Acquisition (SCADA) systems are used for monitoring industrial devices. However, their security faces the threat of being compromised due to the increasing use of open access networks.
Sagarika Ghosh, Srinivas Sampalli
doaj +3 more sources
Keeping Host Sanity for Security of the SCADA Systems
Cyber attacks targeting the Supervisory Control and Data Acquisition (SCADA) systems are becoming more complex and more intelligent. Currently proposed security measures for the SCADA systems come under three categories: physical/logical network ...
Jae-Myeong Lee, Sugwon Hong
doaj +3 more sources
Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study [PDF]
The convergence of operational technology (OT) and information technology (IT) in industrial environments, such as water treatment plants, has significantly increased the attack surface of Supervisory Control and Data Acquisition (SCADA) systems ...
Ali Sayghe
doaj +2 more sources
Non-local attention enhanced deep learning for robust cyberattack detection in industrial IoT-based SCADA systems [PDF]
Industrial Internet of Things (IIoT)-enabled Supervisory Control and Data Acquisition (SCADA) systems are pivotal for real-time monitoring and control in critical sectors like energy, manufacturing, and water management.
Mustafa Tahsin Yilmaz +3 more
doaj +2 more sources
Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems [PDF]
Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in monitoring, managing, and controlling industrial processes, face flexibility, scalability, and management difficulties arising from traditional network structures ...
Onur Polat +6 more
doaj +2 more sources
A Survey of Security Challenges in Cloud-Based SCADA Systems
Supervisory control and data acquisition (SCADA) systems enable industrial organizations to control and monitor real-time data and industrial processes.
Arwa Wali, Fatimah Alshehry
doaj +3 more sources
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive.
Abdul Basit Ajmal +5 more
doaj +1 more source
Analysis of ICS and SCADA Systems Attacks Using Honeypots
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations ...
Mohamed Mesbah +3 more
doaj +1 more source
A log mining approach for process monitoring in SCADA [PDF]
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano +2 more
core +10 more sources

