Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information 2009
DOI: 10.1145/1558607.1558627
|View full text |Cite
|
Sign up to set email alerts
|

On building secure SCADA systems using security patterns

Abstract: Critical infrastructure systems are important systems that support our daily lives. Protecting these systems is attracting attention from the research community. The key component of a critical infrastructure system is the process control system, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand, security patterns are a well established concept that are used to analyze, construct and evaluate secure systems. This paper aims to propose methods to build a secure SCADA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Security pattern solution is uses as tool to addresses these threads and secure SCADA communication long run and uses Unified Modeling Language (UML) solution including class diagram and sequence diagram for implementation. Security pattern are also uses for Secure system analysis and construction and evaluation for system security (Fernandez et al, 2009).…”
Section: Scada Communication Using Security Patternsmentioning
confidence: 99%
“…Security pattern solution is uses as tool to addresses these threads and secure SCADA communication long run and uses Unified Modeling Language (UML) solution including class diagram and sequence diagram for implementation. Security pattern are also uses for Secure system analysis and construction and evaluation for system security (Fernandez et al, 2009).…”
Section: Scada Communication Using Security Patternsmentioning
confidence: 99%
“…However, other SCADA network security [10] recommended and adopted. For example, it may be appropriate security measure to select a controller that utilizes an embedded operating system (OS) not popularly used by the general public.…”
Section: Secure Vm For Monitoring Icssmentioning
confidence: 99%
“…Firstly, the techniques employed are mostly on the deployment level. Most of the previous work focus on implementation levels, such as cryptography protocols and algorithms [25,23], design patterns for system design and implementation [12,11], and internal control mechanisms [7,9].…”
Section: Figure 6 Relations Between the Security Modelsmentioning
confidence: 99%
“…While existing work mostly investigate the techniques that can be used within a single system, such as the architecture for a network [21,26], or techniques for building middleware or services [4,11]. …”
Section: Figure 6 Relations Between the Security Modelsmentioning
confidence: 99%