2020
DOI: 10.1109/comst.2020.2987688
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics

Abstract: Supervisory Control and Data Acquisition (SCADA) systems are the underlying monitoring and control components of critical infrastructures, such as power, telecommunication, transportation, pipelines, chemicals and manufacturing plants. Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats. However, the increasing connection of SCADA systems to the Internet, as well as corporate networks, introduces severe security issues. Security considerations for SCADA systems a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
109
0
6

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 200 publications
(115 citation statements)
references
References 148 publications
0
109
0
6
Order By: Relevance
“…In the conventional power system operations paradigm, the electricity is generated in power plants and delivered along with the transmission systems to the customers in the distribution systems. The EMSs placed in control canters can monitor as well as control this unidirectional process via employing SCADA systems [77]. These SCADA systems are typically hosted on dedicated communication infrastructures, including the local area networks, wide-area networks (WANs), and field area networks.…”
Section: Cp Viewpoint Of Networked Smart Grid Security a Smart Gmentioning
confidence: 99%
See 1 more Smart Citation
“…In the conventional power system operations paradigm, the electricity is generated in power plants and delivered along with the transmission systems to the customers in the distribution systems. The EMSs placed in control canters can monitor as well as control this unidirectional process via employing SCADA systems [77]. These SCADA systems are typically hosted on dedicated communication infrastructures, including the local area networks, wide-area networks (WANs), and field area networks.…”
Section: Cp Viewpoint Of Networked Smart Grid Security a Smart Gmentioning
confidence: 99%
“…Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2021.3063229, IEEE Access [84], [105], [139], [197] Bad command generation of automatic generation control and manipulate sampling data Transmission threats SCADA [26], [77], [78] Triggering false alarms and injecting false data, and changing the switch states…”
Section: B the Cps Security Threats In The Smart Grid And Industrialmentioning
confidence: 99%
“…Path 1 is chosen due to SCADA systems is one of the most vulnerable ICT components in the energy sector. Additionally, there has been a considerable amount of real cyber‐incidents are happening through SCADA systems [20, 21]. There are six distinctive phases that P 1 –P 6 are defined as secure and failed system states, respectively.…”
Section: Mathematical Modelmentioning
confidence: 99%
“…For the data-packet length poison probability function, the suggested system for the detection of ping death attacks is used [2]. The cyber-attacks such DoS, DDoS, domain name system, man in the middle, or also some virus-based attacks are discussed in the research study [3]. Detecting any security-attack comes in the category of cybercrime, which can be find-out or traced by using different techniques like hidden-markov model or also some machine learning strategies, which include naïve bayes, k-nearest neighbor, as well as cyber-bullying detection [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%