2017 International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP) 2017
DOI: 10.1109/bcwsp.2017.8272569
|View full text |Cite
|
Sign up to set email alerts
|

Network security analysis SCADA system automation on industrial process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Some researchers also investigated issues and proposed solutions for forensics in specific areas of CPS. One area is concerning SCADA (Supervisory Control and Data Acquisition), which is used for monitoring and controlling industrial facilities such as oil and gas refineries as illustrated in [58][59][60]. Other areas include the electrical power grid [61], smart homes [62], smart cities [63], connected vehicles [64], and additive manufacturing systems [65].…”
Section: Related Workmentioning
confidence: 99%
“…Some researchers also investigated issues and proposed solutions for forensics in specific areas of CPS. One area is concerning SCADA (Supervisory Control and Data Acquisition), which is used for monitoring and controlling industrial facilities such as oil and gas refineries as illustrated in [58][59][60]. Other areas include the electrical power grid [61], smart homes [62], smart cities [63], connected vehicles [64], and additive manufacturing systems [65].…”
Section: Related Workmentioning
confidence: 99%
“…Attacks can occur at all layers from the supervisory level to the field instrumentation level [15]. The most common attacks are outlined in Table 1A and 1B [15]- [19].…”
Section: Attacks On Scada Networkmentioning
confidence: 99%
“…This control systems support real time monitor and control devices. These systems consist of central controller and assign devices such as sensors and actuators the data transfer between the components utilized communication protocols used in industrial operations.in [3] represent logical analysis for threats, attacks, and how to mitigate these attacks in SCADA field. In [4] show the requirements, and the characteristics of communication system technologies.…”
Section: Introductionmentioning
confidence: 99%
“…After that in section . 3 Provides vulnerabilities of this protocol. These vulnerabilities result in attacks which mentioned in section .4. besides that, in section .5. the paper introduces a dataset to apply the deep learning algorithms.…”
Section: Introductionmentioning
confidence: 99%