2017
DOI: 10.1007/978-3-319-50660-9_4
|View full text |Cite
|
Sign up to set email alerts
|

SCADA System Forensic Analysis Within IIoT

Abstract: A new wave of industrial technology has emerged in the form of Industry 4.0, which has seen a progression from electronic devices and IT (Information Technology) systems that automate production advance to a new revolution of Cyber-Physical Production Systems used for Smart Manufacturing and Smart Factories via IIoT (Industrial Internet of Things). As more and more devices are becoming connected and networked to allow for Smart Manufacturing to take place the number of data sources significantly increases as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…That puts security at risk because of many entry points that each network has, and then all of those networks are interconnected as well. This increases the potential number of weaknesses in the system and vulnerabilities that hackers may want to take advantage of [27].…”
Section: Challenge Resultsmentioning
confidence: 99%
“…That puts security at risk because of many entry points that each network has, and then all of those networks are interconnected as well. This increases the potential number of weaknesses in the system and vulnerabilities that hackers may want to take advantage of [27].…”
Section: Challenge Resultsmentioning
confidence: 99%
“…Cyberattacks at the operational technology (OT) level have grown considerably recently, as it involves integrating new interfaces (i.e., IT systems, cloud, etc.) [ 14 , 15 ] providing flexibility and remote access to both new/old OT (i.e., SCADA, PLCs, etc.) systems.…”
Section: Cybersecurity Challenges In Iiotmentioning
confidence: 99%
“…As per [ 36 , 78 , 79 ] different wireless communication standards can co-exist and be deployed to attain agility and flexibility on the production floor. Authors in [ 50 ] point out limitations in existing standards, whereas [ 5 , 15 , 74 ] underline IT/OT convergence and interoperability issues [ 28 , 41 ]. The use-case examples presented in [ 6 , 11 , 77 ] bring attention to wireless communication security and performance metrics for I4.0 and [ 42 , 47 ] provide methods for improving M2M/IoT security at the component level.…”
Section: Overview Of Work On Standards Cybersecurity and Communications Related To I40mentioning
confidence: 99%
“…To mitigate the effect of threats on SCADA, den, P. et.al has presented a seven stem forensic model for IIoT structure. This model understands, detects, isolates, avoids, analyzes, responds and reports the finding and then updates the system architecture and requirements for future prevention [65]. Another detection model to collect and communicate attack data to the forensic department is shown by T.Guo et.al [66].…”
Section: Other Solutionsmentioning
confidence: 99%