2014 IEEE International Conference on Automation, Quality and Testing, Robotics 2014
DOI: 10.1109/aqtr.2014.6857919
|View full text |Cite
|
Sign up to set email alerts
|

Security and intrusion detection on critical SCADA systems for water management

Abstract: SCADA systems are broadly employed in supervising and controlling industrial areas comprising manufacturing industries, traffic control, power plants, integrated water management systems (distribution, treatment and sewage).The security of SCADA systems represents a significant subject on account of the critical function that these systems perform in offering vital utility services. In nowadays industrial systems ubiquitous access to Internet enhance the vulnerabilities of SCADA systems, for the reason that th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Historically, SCADA systems were designed to be physically isolated from various computing resources, apart from using proprietary hardware components, software, and communication protocols. Only minor attention had been given to cyber-security [7,9,10]. As a consequence, most of the SCADA communication protocols, for instance, IEC 60870-5-104, IEC 60870-5-101, and Distributed Network Protocol (DNP3), were designed with limited or no security mechanism [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Historically, SCADA systems were designed to be physically isolated from various computing resources, apart from using proprietary hardware components, software, and communication protocols. Only minor attention had been given to cyber-security [7,9,10]. As a consequence, most of the SCADA communication protocols, for instance, IEC 60870-5-104, IEC 60870-5-101, and Distributed Network Protocol (DNP3), were designed with limited or no security mechanism [11][12][13].…”
Section: Introductionmentioning
confidence: 99%