264 research outputs found

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    A Survey on Industrial Control System Testbeds and Datasets for Security Research

    Full text link
    The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturing companies (e.g., chemical industries), attacks can lead to devastating physical damages. In dealing with this security requirement, the research community focuses on developing new security mechanisms such as Intrusion Detection Systems (IDSs), facilitated by leveraging modern machine learning techniques. However, these algorithms require a testing platform and a considerable amount of data to be trained and tested accurately. To satisfy this prerequisite, Academia, Industry, and Government are increasingly proposing testbed (i.e., scaled-down versions of ICSs or simulations) to test the performances of the IDSs. Furthermore, to enable researchers to cross-validate security systems (e.g., security-by-design concepts or anomaly detectors), several datasets have been collected from testbeds and shared with the community. In this paper, we provide a deep and comprehensive overview of ICSs, presenting the architecture design, the employed devices, and the security protocols implemented. We then collect, compare, and describe testbeds and datasets in the literature, highlighting key challenges and design guidelines to keep in mind in the design phases. Furthermore, we enrich our work by reporting the best performing IDS algorithms tested on every dataset to create a baseline in state of the art for this field. Finally, driven by knowledge accumulated during this survey's development, we report advice and good practices on the development, the choice, and the utilization of testbeds, datasets, and IDSs

    Seeds of Solutions™: An economical & efficient approach towards power engineering education

    Get PDF
    Power demands are set to increase over the next twenty years; however, research shows that there may be a shortage of power engineers due to an appreciable percentage of the current power engineer workforce retiring, insufficient enrollment in power engineering programs and a lack of emphasis in power engineering at the university level. This thesis provides supporting research for future power demands, workforce and faculty shortages. Using temporary research in modern learning / teaching styles, student / teacher perceptions, educational trends and regional course offerings, this thesis describes a learning approach towards power engineering education. Designed specifically for universities with little to no power engineering course offerings and universities that wish to augment their existing approach, the approach incorporates an emphasis in fundamentals and engineering design making it economical and easy to implement. This thesis also includes three (3) video laboratory examples incorporating all elements of the approach

    National Conference on ‘Renewable Energy, Smart Grid and Telecommunication-2023

    Get PDF
    Theme of the Conference: “The challenges and opportunities of integrating renewable energy into the grid” The National Conference on Renewable Energy, Smart Grid, and Telecommunication - 2023 is a platform for industry experts, researchers, and policymakers to come together and explore the latest advancements and challenges in the fields of renewable energy, smart grids, and telecommunication. Conference Highlights: In-depth discussions on renewable energy technologies and innovations. Smart grid integration for a sustainable future. The role of telecommunication in advancing renewable energy solutions. Networking opportunities with industry leaders and experts. Presentation of cutting-edge research papers and case studies. Conference topics: Renewable Energy Technologies and Innovations Smart Grid Development and Implementation Telecommunication for Energy Systems Energy Storage and Grid Balancing Policy, Regulation, and Market Dynamics Environmental and Social Impacts of Renewable Energy Energy Transition and Future Outlook Integration of renewable energy into the grid Microgrids and decentralized energy systems Grid cybersecurity and data analytics IoT and sensor technologies for energy monitoring Data management and analytics in energy sector Battery storage technologies and applicationshttps://www.interscience.in/conf_proc_volumes/1087/thumbnail.jp
    • …
    corecore