2015 Annual IEEE India Conference (INDICON) 2015
DOI: 10.1109/indicon.2015.7443439
|View full text |Cite
|
Sign up to set email alerts
|

A triple layer intrusion detection system for SCADA security of electric utility

Abstract: World is talking about connecting everything to the internet. Electric grids are no exception, and are rather one of the first application areas of the proposal. This connection with the internet has raised concerns about the inherent supervisory control and data acquisition (SCADA) systems, whose structure too is adapting with the upcoming needs. The security concerns also include other vulnerabilities, which are not caused due to the internet connectivity, but rather due to some disgruntled employee or socia… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…A typical SCADA network collects data from the field devices (sensors, actuators, etc. ), which directly engage with the CIs physical equipment such as pumps and valves [29]. The RTUs, PLCs, IEDs assist in retrieving real-time data from the field devices, which control and monitor the actions of the CIs' process [30].…”
Section: Brief Overview Of Modern Scada Architecturementioning
confidence: 99%
“…A typical SCADA network collects data from the field devices (sensors, actuators, etc. ), which directly engage with the CIs physical equipment such as pumps and valves [29]. The RTUs, PLCs, IEDs assist in retrieving real-time data from the field devices, which control and monitor the actions of the CIs' process [30].…”
Section: Brief Overview Of Modern Scada Architecturementioning
confidence: 99%
“…Supervised learning algorithms use labeled training data to formulate detection models, e.g., set of rules [101], separation plane [75], decision trees [39], neural network [61]. Later on, these mod-els are used to detect anomalies.…”
Section: Supervised Learning Techniquesmentioning
confidence: 99%
“…It formulates a tree-like data structure from a set of attributes of each training tuple. Using a decision tree a rule set is easily derived, which can be used to classify the input into a particular group [79,90,101]. There are several algorithms in the group, such as Classification and Regression Tree (CART), Iterative Dichotomiser (ID3), C4.5 (an improved ID3), Frequent Pattern (FP) Growth, Supervised Learning in Quest (SLIQ), SPRINT, and Random Forest (RF).…”
Section: Taxonomy Of Supervised Learning Approachesmentioning
confidence: 99%
See 2 more Smart Citations