Cyber security of critical infrastructures

被引:70
|
作者
Maglaras, Leandros A. [1 ,4 ]
Kim, Ki-Hyung [2 ]
Janicke, Helge [1 ]
Ferrag, Mohamed Amine [3 ]
Rallis, Stylianos [4 ]
Fragkou, Pavlina [5 ]
Maglaras, Athanasios [6 ]
Cruz, Tiago J. [7 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Ajou Univ, Suwon, South Korea
[3] Guelma Univ, Dept Comp Sci, Guelma, Algeria
[4] Gen Secretariat Digital Policy, Athens, Greece
[5] TEI Athens, Dept Informat, Athens, Greece
[6] TEI Thessaly, Dept Elect Engn, Larisa, Greece
[7] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
来源
ICT EXPRESS | 2018年 / 4卷 / 01期
关键词
SCADA systems; Security; SYSTEMS;
D O I
10.1016/j.icte.2018.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. (C) 2018 The Korean Institute of Communications Information Sciences. Publishing Services by Elsevier B.V.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 50 条
  • [31] Quantification of the Impact of Cyber Attack in Critical Infrastructures
    Netkachov, Oleksandr
    Popov, Peter
    Salako, Kizito
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, 2014, 8696 : 316 - 327
  • [33] Using Integrated System Theory Approach to Assess Security for SCADA Systems Cyber Security for Critical Infrastructures: A Pilot Study
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 1000 - 1006
  • [34] PolyOrBAC: A security framework for Critical Infrastructures
    Abou El Kalam, A.
    Deswarte, Y.
    Baina, A.
    Kaaniche, M.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) : 154 - 169
  • [35] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [36] Collaboration in Security Assessments for Critical Infrastructures
    Koester, Friedrich
    Klaas, Michael
    Nguyen, Hanh Quyen
    Braendle, Markus
    Obermeier, Sebastian
    Brenner, Walter
    CRIS: 4TH INTERNATIONAL CONFERENCE ON CRITICAL INFRASTRUCTURE, 2009, : 59 - 65
  • [37] Insider Threats to IT Security of Critical Infrastructures
    Gaidarski, Ivan
    Minchev, Zlatogor
    Studies in Big Data, 2021, 84 : 381 - 394
  • [38] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [39] A Security Assessment Methodology for Critical Infrastructures
    Caselli, Marco
    Kargl, Frank
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 332 - 343
  • [40] On the Effectiveness of Security Countermeasures for Critical Infrastructures
    Hausken, Kjell
    He, Fei
    RISK ANALYSIS, 2016, 36 (04) : 711 - 726