1,112 research outputs found

    The significance of the transition of Supervisory Control and Data Acquisition (SADA) Systems to TCP/IP platforms

    Get PDF
    SCADA system security is a significant United States national security issue based on the systems’ vulnerabilities and the cyber threats that seek to exploit them. Within the last fifteen years as SCADA systems have collectively transitioned to Transmission Control Protocol/ Internet Protocol (TCP/IP) networks, analysts and policy-makers have expressed increased concern over the general security and protection of SCADA systems, which are responsible for monitoring and controlling our nation’s critical infrastructure. SCADA systems are susceptible based on their ease of entry and their attractiveness as a target. In addition, there a number of cyber threats such as hackers and malware, insiders, terrorist organizations and state actors that are dangerous based on their intent and capabilities. U.S. government engagement with private sector owners and operators of critical infrastructures is essential for mitigating the abundant threats that characterize cyber-terrorism

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Get PDF
    Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset

    A prototype security hardened field device for SCADA systems.

    Get PDF
    This thesis describes the development of a prototype security hardened field device (such as a remote terminal unit) based on commodity hardware and implementing a previously developed security architecture. This security architecture has not been implemented in the past due to the difficulty of providing an operating system which meets the architecture\u27s isolation requirements. Recent developments in both hardware and software have made such an operating system possible, opening the door to the implementation and development of this new security architecture in physical devices attached to supervisory control and data acquisition (SCADA) systems. A prototype is developed using commodity hardware selected for similarity to existing industrial systems and making use of the new OKL4 operating system. Results of prototype development are promising, showing performance values which are adequate for a broad range for industrial applications

    Artificial Intelligence Technique and Wireless Sensor Networks in Energy Management System for Secure Power Optimization

    Get PDF
    The modern basic building blocks of a control system consist of data acquisition, dispensation of data by the system operators and the remote control of system devices. However, the physical controls, technical examinations and deductions were originally implemented to aid the process and control of power system design. The complexity of the power system keeps increasing due the technical improvements, diversity and dynamic requirements. Artificial intelligence is the science of automating intelligent activities presently attainable by individuals. Intelligent system techniques may be of excessive benefit in the application of area power system controls. Whereas smart grid can be measured as a modern electric power grid structure for better productivity and dependability via automatic control, excessive power converters, modern communications setup, sensing and metering equipment, and modern energy management techniques established on the optimization of demand, energy and network accessibility,and so on. The enormous depiction of the entire transmission grid, in the perspective of smart grids, is quite unclear; and in Nigeria no studies have been put on ground in order for the existing network to be turn into a smart grid. In this research work emphasis is placed on generation and transmission stations; power optimization using artificial intelligent techniques and wireless sensor networks for power control management system

    Preliminaries of orthogonal layered defence using functional and assurance controls in industrial control systems

    Get PDF
    Industrial Control Systems (ICSs) are responsible for the automation of different processes and the overall control of systems that include highly sensitive potential targets such as nuclear facilities, energy-distribution, water-supply, and mass-transit systems. Given the increased complexity and rapid evolvement of their threat landscape, and the fact that these systems form part of the Critical National infrastructure (CNI), makes them an emerging domain of conflict, terrorist attacks, and a playground for cyberexploitation. Existing layered-defence approaches are increasingly criticised for their inability to adequately protect against resourceful and persistent adversaries. It is therefore essential that emerging techniques, such as orthogonality, be combined with existing security strategies to leverage defence advantages against adaptive and often asymmetrical attack vectors. The concept of orthogonality is relatively new and unexplored in an ICS environment and consists of having assurance control as well as functional control at each layer. Our work seeks to partially articulate a framework where multiple functional and assurance controls are introduced at each layer of ICS architectural design to further enhance security while maintaining critical real-time transfer of command and control traffic
    corecore