DocumentCode :
678522
Title :
An approach to detect malicious activities in SCADA systems
Author :
Pramod, T.C. ; Sunitha, N.R.
Author_Institution :
Dept. of Comput. Sci. & Eng., Siddaganga Inst. of Technol., Tumkur, India
fYear :
2013
fDate :
4-6 July 2013
Firstpage :
1
Lastpage :
7
Abstract :
Supervisory Control and Data Acquisition System (SCADA) is an emerging application for industrial automation. It is being widely used in critical infrastructure for monitoring and controlling the activities. The collaborative environment and interconnectivity of SCADA system needs communications and transmission of sensed real time data like status of machines, breaks and leakages in the system across various devices in the industrial plant. Such real time data provoke security breaches to SCADA systems and results in compromise of availability, integrity, confidentiality and trust relationship between the devices of SCADA systems. As the numbers of deliberate cyber attacks on these systems are increasing, providing a scheme to identify malicious activities and defend the attacks; thereby create secure environment for SCADA systems is an essential task. By considering constraints and efficiency requirements for such networks, we are proposing a scheme that uses Log to identify some malicious activities through continuous monitoring. In Log, we have only prioritized some parameters that help us to detect some vulnerable activities and at node level by using cooperative monitoring the nodes itself takes care of some attacks. In this new approach Log analysis for the identification of malicious activities is made using cluster based architecture. This work also considers the constraints of the SCADA system thereby providing an elegant identification of malicious activities for the current SCADA system.
Keywords :
SCADA systems; control engineering computing; industrial control; industrial plants; production engineering computing; security of data; system monitoring; Log analysis approach; SCADA systems; cluster based architecture; cooperative monitoring; critical infrastructure; cyber attacks; human machine interface; industrial automation; industrial plant; malicious activity detection; malicious activity identification; node level; supervisory control and data acquisition system; Computer architecture; Jamming; Magnetic heads; Monitoring; SCADA systems; Security; Sensors; Aggregation; ICS-Industrial control system; Log Management; SCADA; attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
Type :
conf
DOI :
10.1109/ICCCNT.2013.6726619
Filename :
6726619
Link To Document :
بازگشت