2020
DOI: 10.1109/access.2020.2994961
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

Abstract: Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control and data acquisition (SCADA) systems due to their architecture, stringent real-time requirements, network traffic features and specific application layer protocols. This article aims to contribute to assess the state-ofthe-art, identify the open issues and provide an insight for future study areas. To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in S… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(36 citation statements)
references
References 56 publications
0
29
0
Order By: Relevance
“…Similarly, after giving the necessary information regarding the CPS and intrusion detection methods, Mitchel and Chen study a plethora of specially designed IDS for the CPS. In [17] [35]- [37]. Therefore, taking into account the aforementioned points, subsequently, we discuss some specific IDS cases that use DL techniques for detecting intrusions against the SG and SCADA systems.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, after giving the necessary information regarding the CPS and intrusion detection methods, Mitchel and Chen study a plethora of specially designed IDS for the CPS. In [17] [35]- [37]. Therefore, taking into account the aforementioned points, subsequently, we discuss some specific IDS cases that use DL techniques for detecting intrusions against the SG and SCADA systems.…”
Section: Related Workmentioning
confidence: 99%
“…Major architectural components of a modern SCADA system include: field devices, RTUs, MTUs, programmable logic controllers (PLCs), intelligent electronic devices (IEDs), HMI, Historian, etc. [5,16]. Figure 3 presents the simplified architectural structure of a SCADA system.…”
Section: Brief Overview Of Modern Scada Architecturementioning
confidence: 99%
“…Proprietary SCADA systems' components which includes the human machine interface (HMI), sensors, master terminal units (MTU), remote terminal units (RTU), etc. are vulnerable to different forms of intrusions [5,15,16]. Also, the various protocols being used for communication, which include Modbus, DNP3, Profibus, etc., can be remotely targeted, via cyberattacks [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Boštjančič Rakas et al [43] A review and classification of available intrusion detection systems for SCADA. Provides a structured evaluation methodology and also details for development of IDS testbeds.…”
Section:    mentioning
confidence: 99%