نتایج جستجو برای: scada

تعداد نتایج: 1605  

2014
Rahul Kumar Rishabh Shukla Ajit Pratap Singh Sachin Kumar

Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the leve...

2009
Nils Kalstad Svendsen Stephen D. Wolthusen

Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA e...

2004
James H. Graham

Supervisory Control and Data Acquisition (SCADA) networks control the critical utility and process control infrastructures in many countries. They perform vital functions for utility companies including electricity, natural gas, oil, water, sewage, and railroads. However, little attention was given to security considerations in the initial design and deployment of these systems, which has cause...

2010
FANG LAN WANG CHUNLEI HE RONGHUI

SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA protocol implementation. Firstly, the memory taintedness model of SCADA protocol implementation is formally defined. Based on this model, the de...

1999
M. A. Westhoff

INTRODUCTION Interstate natural gas pipelines are operated using sophisticated supervisory control and data acquisition (SCADA) systems. These systems are used to monitor, control and analyze operations. Software which runs in conjunction with the basic SCADA system expands the usefulness of SCADA data to enhance reliability and efficiency of operations, improve customer service, and minimize u...

2017
Nazmul Hossain Md. Alam Hossain Taposh Das Md. Tariqul Islam

The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results. A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration lev...

2002
Hideo Nakata Satoshi Harauchi Taizo Kojima Yasuaki Nakamura

This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. This method can be used with various SCADA systems, and provides visual editing tools for conversion rule modification. The SCADA sys...

Journal: :Computers & Security 2006
Vinay M. Igure Sean A. Laughter Ronald D. Williams

The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. This paper provides an overview of all the crucial research issues that are involved in strengthening the cyber security of SCADA networks. The paper describes the general architecture of SCADA networks and the properties of some of the com...

2010
Rohan Chabukswar Bruno Sinópoli Gabor Karsai Annarita Giani Himanshu Neema Andrew Davis

Security is a major issue affecting SCADA systems, designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in heterogenous domains and simulation environments. Here, we simulate a chemical plant and its controller, communicating through an ethernet network. We simulate and obser...

2009
Igor Nai Fovino Andrea Carcano Marcelo Masera Alberto Trombetta

The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically targe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید