Cyber security of critical infrastructures

被引:70
|
作者
Maglaras, Leandros A. [1 ,4 ]
Kim, Ki-Hyung [2 ]
Janicke, Helge [1 ]
Ferrag, Mohamed Amine [3 ]
Rallis, Stylianos [4 ]
Fragkou, Pavlina [5 ]
Maglaras, Athanasios [6 ]
Cruz, Tiago J. [7 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Ajou Univ, Suwon, South Korea
[3] Guelma Univ, Dept Comp Sci, Guelma, Algeria
[4] Gen Secretariat Digital Policy, Athens, Greece
[5] TEI Athens, Dept Informat, Athens, Greece
[6] TEI Thessaly, Dept Elect Engn, Larisa, Greece
[7] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
来源
ICT EXPRESS | 2018年 / 4卷 / 01期
关键词
SCADA systems; Security; SYSTEMS;
D O I
10.1016/j.icte.2018.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. (C) 2018 The Korean Institute of Communications Information Sciences. Publishing Services by Elsevier B.V.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 50 条
  • [41] SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures
    Zonouz, Saman
    Rogers, Katherine M.
    Berthier, Robin
    Bobba, Rakesh B.
    Sanders, William H.
    Overbye, Thomas J.
    IEEE TRANSACTIONS ON SMART GRID, 2012, 3 (04) : 1790 - 1799
  • [42] The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system
    Han, Choong-Hee
    Park, Soon-Tai
    Lee, Sang-Joon
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 26
  • [43] Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 242 - 249
  • [44] Mapping Cyber-Physical Threats for Critical Infrastructures
    Mundt, Michael
    Baier, Harald
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2022, 2023, 13723 : 164 - 179
  • [45] The Cyber Threat to National Critical Infrastructures: Beyond Theory
    Geers, Kenneth
    INFORMATION SECURITY JOURNAL, 2009, 18 (01): : 1 - 7
  • [46] Cyber Attack Impact on Critical Smart Grid Infrastructures
    Sgouras, Kallisthenis I.
    Birda, Athina D.
    Labridis, Dimitris P.
    2014 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2014,
  • [47] Cyber Protection of Critical Infrastructures Using Supervised Learning
    Patrascu, Alecsandru
    Patriciu, Victor Valeriu
    2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 461 - 468
  • [48] Risk assessment for physical and cyber attacks on critical infrastructures
    Depoy, J.
    Phelan, J.
    Sholander, P.
    Smith, B.
    Varnado, G. B.
    Wyss, G.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1961 - 1969
  • [49] Cyber security in infrastructures. Application to the components of a Smart Grid
    Ramirez, Dionisio
    Ramirez, Valentin
    Venkataramanan, Giri
    DYNA, 2019, 94 (05): : 518 - 522