2019
DOI: 10.11159/eee19.117
|View full text |Cite
|
Sign up to set email alerts
|

Direction of Security Monitoring for Substation Automation Systems

Abstract: All security measures which have been proposed ultimately come under three security strategies: network separation, communication message security, and security monitoring. However, considering the recent sophisticated attacks against SCADA/ICS systems, these security strategies cannot provide sufficient security measures. These attacks try to hijack or take control of host systems, control servers and eventually control devices, once they penetrate the networks in one way or another. Their attack vectors are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Even though these three strategies give us a holistic approach to SCADA security, recent attacks on SCADA/ICS systems such as Stuxnet, Black Energy 3, Triton, and Industroyer make us realize that these strategies are necessary but not sufficient. The nature of these attacks is that once attackers penetrate the SCADA network, they take control of host systems by process manipulation, whether they are control servers or local device controllers [7]. Moreover, attackers use specially designed malware for SCADA to invade the core system of SCADA and achieve their attack goals [8], [9].…”
mentioning
confidence: 99%
“…Even though these three strategies give us a holistic approach to SCADA security, recent attacks on SCADA/ICS systems such as Stuxnet, Black Energy 3, Triton, and Industroyer make us realize that these strategies are necessary but not sufficient. The nature of these attacks is that once attackers penetrate the SCADA network, they take control of host systems by process manipulation, whether they are control servers or local device controllers [7]. Moreover, attackers use specially designed malware for SCADA to invade the core system of SCADA and achieve their attack goals [8], [9].…”
mentioning
confidence: 99%