• DocumentCode
    678522
  • Title

    An approach to detect malicious activities in SCADA systems

  • Author

    Pramod, T.C. ; Sunitha, N.R.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Siddaganga Inst. of Technol., Tumkur, India
  • fYear
    2013
  • fDate
    4-6 July 2013
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Supervisory Control and Data Acquisition System (SCADA) is an emerging application for industrial automation. It is being widely used in critical infrastructure for monitoring and controlling the activities. The collaborative environment and interconnectivity of SCADA system needs communications and transmission of sensed real time data like status of machines, breaks and leakages in the system across various devices in the industrial plant. Such real time data provoke security breaches to SCADA systems and results in compromise of availability, integrity, confidentiality and trust relationship between the devices of SCADA systems. As the numbers of deliberate cyber attacks on these systems are increasing, providing a scheme to identify malicious activities and defend the attacks; thereby create secure environment for SCADA systems is an essential task. By considering constraints and efficiency requirements for such networks, we are proposing a scheme that uses Log to identify some malicious activities through continuous monitoring. In Log, we have only prioritized some parameters that help us to detect some vulnerable activities and at node level by using cooperative monitoring the nodes itself takes care of some attacks. In this new approach Log analysis for the identification of malicious activities is made using cluster based architecture. This work also considers the constraints of the SCADA system thereby providing an elegant identification of malicious activities for the current SCADA system.
  • Keywords
    SCADA systems; control engineering computing; industrial control; industrial plants; production engineering computing; security of data; system monitoring; Log analysis approach; SCADA systems; cluster based architecture; cooperative monitoring; critical infrastructure; cyber attacks; human machine interface; industrial automation; industrial plant; malicious activity detection; malicious activity identification; node level; supervisory control and data acquisition system; Computer architecture; Jamming; Magnetic heads; Monitoring; SCADA systems; Security; Sensors; Aggregation; ICS-Industrial control system; Log Management; SCADA; attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
  • Conference_Location
    Tiruchengode
  • Print_ISBN
    978-1-4799-3925-1
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2013.6726619
  • Filename
    6726619