Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Advance Defense Modeling for SCADA Systems


Affiliations
1 PSN College of Engineering & Technology, India
2 PSN College of Engineering and Technology, Tirunelveli, India
     

   Subscribe/Renew Journal


The supervisory control and data acquisition (SCADA) systems are widely used in the industry for monitoring and control of the power grid. These systems include computer and communication devices. The computers used in SCADA systems are vulnerable to malicious attacks or other cyber impacts which subsequently will adversely affect the power infrastructure. The main objective of this work is to provide better cyber security for these computer systems. In this paper a supervisory control and data acquisition (SCADA) security framework with the following five components is proposed: 1) Real-time Monitoring; 2) Online monitoring; 3) Anomaly detection; 4) Impact analysis; and 5) Mitigation Strategies. For impact analysis an attack tree based methodology is used. Thus with these key features a fault-proof cyber security can be provided for SCADA system.

Keywords

Attack Tree, Cyber Security, SCADA, Vulnerability.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 161

PDF Views: 3




  • Advance Defense Modeling for SCADA Systems

Abstract Views: 161  |  PDF Views: 3

Authors

Suma Christal Mary
PSN College of Engineering & Technology, India
Renjini Jose
PSN College of Engineering and Technology, Tirunelveli, India

Abstract


The supervisory control and data acquisition (SCADA) systems are widely used in the industry for monitoring and control of the power grid. These systems include computer and communication devices. The computers used in SCADA systems are vulnerable to malicious attacks or other cyber impacts which subsequently will adversely affect the power infrastructure. The main objective of this work is to provide better cyber security for these computer systems. In this paper a supervisory control and data acquisition (SCADA) security framework with the following five components is proposed: 1) Real-time Monitoring; 2) Online monitoring; 3) Anomaly detection; 4) Impact analysis; and 5) Mitigation Strategies. For impact analysis an attack tree based methodology is used. Thus with these key features a fault-proof cyber security can be provided for SCADA system.

Keywords


Attack Tree, Cyber Security, SCADA, Vulnerability.