Protocols, Solutions, and Testbeds for Cyber-Attack Prevention in Industrial SCADA Systems

被引:0
|
作者
Kumar A. [1 ]
Bhushan B. [1 ]
Malik A. [2 ]
Kumar R. [3 ]
机构
[1] School of Engineering and Technology, Sharda University, Greater Noida
[2] Noida Institute of Engineering Technology (NIET), Greater Noida
[3] GIET University, Gunupur
来源
Studies in Big Data | 2021年 / 99卷
关键词
Anti-malware; Cross-site scripting; Intrusion detection system Firewall; Root privilege escalation; SQL injection; Testbeds;
D O I
10.1007/978-981-16-6210-2_17
中图分类号
学科分类号
摘要
The commencement of automation with Industrie 4.0 has brought complex heterogeneous structures. These complex structures work on interconnected nodes or devices that operate on real-time data. The monitoring of industries is carried out using Supervisory Control and Data Acquisition (SCADA) system, whose backbones are the network and the data collected from numerous automated devices. Network-based attacks are prevailing huge in numbers. Therefore, it becomes vital to protect these industries and SCADA-based systems from hackers. This paper covers crucial components of the SCADA system that simplifies to understand the working and infrastructure of the SCADA system. The paper also investigates security flaws and most significant protocols that could nullify the security loopholes. Further, the most suitable security recommendations are highlighted. Finally, the pre-mortem testbeds of cyber security dedicated for SCADA system have been clubbed together, which alerts the virtually developed SCADA system about possible threats before it is actually built on the real industrial ground. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2022.
引用
收藏
页码:355 / 380
页数:25
相关论文
共 50 条
  • [1] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [2] How to protect SCADA systems from cyber-attack
    Rush, William F.
    Kinast, John A.
    [J]. Gas Utility Manager, 2003, 47 (09): : 12 - 18
  • [3] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [5] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566
  • [6] Here's what you need to know to protect SCADA systems from cyber-attack
    [J]. Rush, W.F., 1600, Oildom Publishing Co. of Texas Inc. (230):
  • [7] Here's what you need to know to protect SCADA systems from cyber-attack
    Rush, WF
    Kinast, JA
    [J]. PIPELINE & GAS JOURNAL, 2003, 230 (02) : 29 - 30
  • [8] Extending the cyber-attack landscape for SCADA-based critical infrastructure
    Rodofile, Nicholas R.
    Radke, Kenneth
    Foo, Ernest
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 14 - 35
  • [9] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    [J]. BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [10] Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,