DocumentCode
119978
Title
Cyber threats and defence approaches in SCADA systems
Author
Dong-Ho Kang ; Byoung-Koo Kim ; Jung-Chan Na
Author_Institution
Convergence Security Res. Sect., ETRI (Electron. & Telecommun. Res. Inst.), Daejeon, South Korea
fYear
2014
fDate
16-19 Feb. 2014
Firstpage
324
Lastpage
327
Abstract
The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. And they are becoming more and more susceptible to cyber-attacks due to utilize standard protocols and increase connectivity. The objective of this paper is to introduce our on-going work and discuss challenges and opportunities for preventing network and application protocol attacks on SCADA systems.
Keywords
SCADA systems; computer network security; protocols; SCADA systems; application protocol attacks; cyber threats; cyber-attacks; defence approaches; remote equipment; Filtering; IP networks; Intrusion detection; Protocols; SCADA systems; Servers; Cyber-attacks; ICS Security; Industrial Firewall; Network Security; SCADA;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Conference_Location
Pyeongchang
Print_ISBN
978-89-968650-2-5
Type
conf
DOI
10.1109/ICACT.2014.6778974
Filename
6778974
Link To Document