CISUC

Cyber Security of Critical Infrastructures

Authors

Abstract

Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to conventional in addition to new threats. Many security methods can be applied to such systems, taking in mind that both high efficiency, real time intrusion identification and low overhead are required.

Keywords

SCADA, IACS, Cyber-security

Subject

Critical Infrastructure Security

Journal

Elsevier ICT Express - Special Issue on CI & Smart Grid Cyber Security , Eun-Soo Kim, February 2018

DOI


Cited by

Year 2019 : 6 citations

 Handa A, Sharma A, Shukla SK. Machine learning in cybersecurity: A review. Wiley WIREs - Data Mining and Knowledge Discovery. 2019; DOI:10.1002/widm.1306

 Hu, Y., Li, H., Yang, H. et al., "Detecting stealthy attacks against industrial control systems based on residual skewness analysis", EURASIP J Wireless Com Network (2019) 2019: 74. DOI: 10.1186/s13638-019-1389-1

 Hu, Yan & Li, Hong & H. Luan, Tom & Yang, An & Sun, Limin & Wang, Zhiliang & Wang, Rui. (2018). Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Generation Computer Systems. 10.1016/j.future.2018.07.027.

 R. Jidin, S. N. Tukijan, I. Al-Bahadly, N. Jamil and Q. S. Qassim, "Prototyping a Lightweight Encryption on a Field Programmable Gate Array for Securing Tele-Control Data," 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Penang, Malaysia, 2018, pp. 180-185. DOI: 10.1109/ICCSCE.2018.8685001

 R. Kekoa Koehler, "When the Lights Go Out: Vulnerabilities to US Critical Infrastructure,
the Russian Cyber Threat, and a New Way Forward", Georgetown Security Studies Review, Volume 7, Issue 1
January 2019. ISSN 2474-8552 (print); ISSN 2474-8560 (online). URL: http://georgetownsecuritystudiesreview.org/wp-content/uploads/2019/01/GSSR-7.1-final-text-updated.pdf#page=27

 Álvaro Roberto Rojas Castro, "Protección en infraestructuras críticas. Análisis de
seguridad de los sistemas de control industrial", MsC thesis, Máster Interuniversitario en Seguridad de las Tecnologías
de la Información y de las Comunicaciones (MISTIC), Universitat Oberta de Catalunya, January 2019. Available at: http://openaccess.uoc.edu/webapps/o2/bitstream/10609/88006/1/Memoria_TFM_arojascas_PEC4.pdf

Year 2018 : 6 citations

 Lu KC., Liu IH., Sun MW., Li JS. (2019) A Survey on SCADA Security and Honeypot in Industrial Control System. In: Saeed F., Gazem N., Mohammed F., Busalim A. (eds) Recent Trends in Data Science and Soft Computing. IRICT 2018. Advances in Intelligent Systems and Computing, vol 843. Springer, Cham. DOI: 10.1007/978-3-319-99007-1_56

 Raposo, D.; Rodrigues, A.; Sinche, S.; Sá Silva, J.; Boavida, F., "Industrial IoT Monitoring: Technologies and Architecture Proposal". Sensors 2018, 18, 3568. DOI: 10.3390/s18103568

 Nicol, Cameron, "Cybersecurity and national resilience in Estonia", MSc Thesis in International Security, Intelligence
and Strategic Studies (SECINTEL). May 2018. DOI: 20.500.11956/101734.

 Raposo, Duarte & Rodrigues, André & Sinche, Soraya & Sá Silva, Jorge & Boavida, Fernando. (2018). Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9. 10.1109/NCA.2018.8548060.

 Sameera, N. (2018). Protocol-Specific Intrusion Detection System using KNN Classifier. International Journal for Research in Applied Science and Engineering Technology. 6. 292-299. 10.22214/ijraset.2018.5049.

 Vavra, J[an] & Hromada, M[artin] (2018). Comparative Study of Feature Selection Techniques Respecting Novelty Detection in the Industrial Control System Environment, Proceedings of the 29th DAAAM International Symposium, pp.1084-1091, B. Katalinic (Ed.), Published by DAAAM International, ISBN 978-3-902734-20-4, ISSN 1726-9679, Vienna, Austria.
DOI: 10.2507/29th.daaam.proceedings.155