نتایج جستجو برای: scada

تعداد نتایج: 1605  

2006
Steven Cheung Bruno Dutertre Martin Fong Ulf Lindqvist Keith Skinner Alfonso Valdes

In a model-based intrusion detection approach for protecting SCADA networks, we construct models that characterize the expected/acceptable behavior of the system, and detect attacks that cause violations of these models. Process control networks tend to have static topologies, regular traffic patterns, and a limited number of applications and protocols running on them. Thus, we believe that mod...

2017
Antonios Gouglidis David Hutchison

The sovereignty of nations is highly dependent on the continuous and uninterrupted operation of critical infrastructures. Recent security incidents on SCADA networks show that threats in these environments are increasing in sophistication and number. To protect critical infrastructures against cyber attacks and to cope with their complexity, we advocate the application of a resilience strategy....

2005
Timothy P. Creegan

Supervisory control and data acquisition (SCADA) software is used to control and monitor processes throughout industry. The licensing cost of software and the bundling of potentially superfluous functionality into commercial SCADA software could lead organizations to develop their own custom SCADA development tools for internal use. It is important to understand the functionality criteria uniqu...

2010
ROSSLIN JOHN ROBLES TAI-HOON KIM

With the advent of new technologies, the demand of connecting IT systems to the Internet is increasing. This is also the case for Control systems specifically SCADA (Supervisory Control And Data Acquisition) systems. Traditional SCADA systems are connected only in a limited private network. Because SCADA is considered a critical infrastructure, some operators hold back on connecting it to the I...

2010
Tai-hoon Kim

With the advent of new technologies, the demand of connecting IT systems to the Internet is increasing. This is also the case for Control systems specifically SCADA (Supervisory Control and Data Acquisition) systems. Traditional SCADA systems are connected only in a limited private network. Because SCADA is considered a critical infrastructure, some operators hold back on connecting it to the I...

Journal: :JCS 2014
Aamir Shahzad Shahrulniza Musa Abdulaziz Aborujilah Muhammad Irfan

The SCADA system connectivity with several open networks using internet facility brought SCADA platform more vulnerable from attacks/threads. Therefore, the detail security review has been conducted, to find the potential security issues which are residing and warming the SCADA communication and also existing potential security solutions that are used to protect the SCADA communication. However...

2014
Minkyu Choi

This dissertation is a study on the comparison of different Encryption Schemes for Securing SCADA Component Communication. SCADA Communication is a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. Today, it is much more...

2010
Abdelmajid Khelil Sebastian Jeckel Daniel Germanus Neeraj Suri

Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor critical processes. Modern SCADA systems are increasingly built with off-the-shelf components simplifying their integration into existing networks. The benefits of increased flexibility and reduced costs are accompanied by newly introduced challenges regarding SCADA security/dependability. Peer-to-Peer (P2P...

2012
Reda Shbib Shikun Zhou Khalil Alkadhimi

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality. Nowadays, as a demand for connecting the SCADA system to the open network growths, the study of SCAD...

2010
GIOVANNI CAGALABAN TAIHOON KIM SEOKSOO KIM

Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. The emergence of Internet and World Wide Web...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید