2018
DOI: 10.1007/978-981-13-2384-3_32
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in SCADA System: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…These vulnerabilities are classified in [11] into five categories: policies and procedures, architecture and design, configuration and maintenance, physical and software development, and communication and networking. Four other categories were presented in [12]; security policy, communication protocols, architectural and hardware, and software vulnerabilities. The authors in [11] also discussed five factors that might affect the vulnerabilities of traditional SCADA systems, which are: human errors, lack of resources for physical devices, proprietary protocols, unsecure legacy systems, and accidents caused by negligence and equipment failure.…”
Section: ) General Attacks Classificationsmentioning
confidence: 99%
See 1 more Smart Citation
“…These vulnerabilities are classified in [11] into five categories: policies and procedures, architecture and design, configuration and maintenance, physical and software development, and communication and networking. Four other categories were presented in [12]; security policy, communication protocols, architectural and hardware, and software vulnerabilities. The authors in [11] also discussed five factors that might affect the vulnerabilities of traditional SCADA systems, which are: human errors, lack of resources for physical devices, proprietary protocols, unsecure legacy systems, and accidents caused by negligence and equipment failure.…”
Section: ) General Attacks Classificationsmentioning
confidence: 99%
“…One of the main threats of IIoT, defined by Ulltveit-Moe et al [26], is an insider threat that can be performed by employees or IIoT vendors who have authorization to access or control sensors in the networks. Finally, the absence of efficient user authentication and authorization [18], privilege escalation, social engineering, and deficient control access [22] are also considered major security threats and risks for cloud-based SCADA systems [12].…”
Section: ) Insider Attacksmentioning
confidence: 99%
“…However, their focus is on the general concept of cyber-physical systems and not specific on ICSs. Zeng and Zhou [90] have studied the available approaches for intrusion detection systems (IDSs) deployed in ICSs. A taxonomy of the relevant vulnerabilities in these systems is also brought up.…”
Section: Available Surveysmentioning
confidence: 99%
“…Much research has been done in recent years on developing intrusion detection mechanisms for SCADA systems. For instance, see some relevant survey papers [40][41][42][43][44].…”
Section: Related Workmentioning
confidence: 99%