2012
DOI: 10.1109/mc.2012.325
|View full text |Cite
|
Sign up to set email alerts
|

SCADA Systems: Challenges for Forensic Investigators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 95 publications
(61 citation statements)
references
References 13 publications
0
61
0
Order By: Relevance
“…In particular, several authors have proposed the installation of agents on SCADA networks to conduct live forensic acquisition (Ahmed et al, 2012), (Kilpatrick et al, 2006). Live data acquisition is the extraction of data when the device is still running; in digital forensics this is normally used to recover RAM in the memory of a computer (Jones, 2007).…”
Section: Related Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, several authors have proposed the installation of agents on SCADA networks to conduct live forensic acquisition (Ahmed et al, 2012), (Kilpatrick et al, 2006). Live data acquisition is the extraction of data when the device is still running; in digital forensics this is normally used to recover RAM in the memory of a computer (Jones, 2007).…”
Section: Related Researchmentioning
confidence: 99%
“…A key limitation with the majority of existing work such as (Ahmed et al, 2012) (Patzlaff, 2013) is they have not conducted a practical evaluation of their forensic framework. In order to establish if their implementation is capable of extracting forensic artefacts from PLCs.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The work of Ahmed [97] demonstrated a need for forensically examining SCADA systems without turning them off. Ahmed put forward a technique called live forensics in order to detect and thus partially mitigate threats in real time.…”
Section: Live Forensicsmentioning
confidence: 99%
“…In case of potential security incidents, several challenges exist for conducting an effective forensic investigation [4]. Forensic investigation actions are focused on understanding the cause and effects of the intrusion on SCADA systems, in order to improve their cyber defense.…”
Section: B Malwares and Virusesmentioning
confidence: 99%