scholarly journals The trends of supervisory control and data acquisition security challenges in heterogeneous networks

Author(s):  
M. Agus Syamsul Arifin ◽  
Susanto Susanto ◽  
Deris Stiawan ◽  
Mohd Yazid Idris ◽  
Rahmat Budiarto

<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2762
Author(s):  
F. Javier Maseda ◽  
Iker López ◽  
Itziar Martija ◽  
Patxi Alkorta ◽  
Aitor J. Garrido ◽  
...  

This paper presents the design and implementation of a supervisory control and data acquisition (SCADA) system for automatic fault detection. The proposed system offers advantages in three areas: the prognostic capacity for preventive and predictive maintenance, improvement in the quality of the machined product and a reduction in breakdown times. The complementary technologies, the Industrial Internet of Things (IIoT) and various machine learning (ML) techniques, are employed with SCADA systems to obtain the objectives. The analysis of different data sources and the replacement of specific digital sensors with analog sensors improve the prognostic capacity for the detection of faults with an undetermined origin. Also presented is an anomaly detection algorithm to foresee failures and to recognize their occurrence even when they do not register as alarms or events. The improvement in machine availability after the implementation of the novel system guarantees the accomplishment of the proposed objectives.


2006 ◽  
Vol 53 (4-5) ◽  
pp. 179-184 ◽  
Author(s):  
P.J. Smith ◽  
S. Vigneswaran ◽  
H.H. Ngo ◽  
H.T. Nguyen ◽  
R. Ben-Aim

The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.


2015 ◽  
Vol 5 (3) ◽  
pp. 19-27
Author(s):  
Rahul Rastogi ◽  
Rossouw von Solms

SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the underlying physical process. In response to this critical issue, various governments across the world have recognized the issue of SCADA security and have initiated the creation of a regulatory framework for mandating SCADA security in their respective countries. This paper provides a brief overview of the cyber-security issues of SCADA and the implications of Stuxnet for SCADA security. The paper reviews the steps taken by the governments of India and South Africa; and it provides guidance to the owners of SCADA regarding SCADA security, as mandated by the Government of India.


Author(s):  
Carolina Pecanha ◽  
Terry Jansen ◽  
Jon Lind ◽  
Tatiana Fontes

This paper presents an overview of Pipeline Project Technical Documents, along with Control Room Management and Compliance Issues, Challenges and Processes in the Oil & Gas Industry. It will be based on the work that the authors have developed between 2010 and 2015. With an overwhelming number of standards, norms, and best practices, operational and security requirements needs to be well implemented and documented. Any compliance issues have the potential to cause serious repercussions to an organization as an incident or an audit failure could result in significant financial loss. This review is especially critical to the industry as it highlights the advantages of taking a broad approach to obtain and maintain compliance in today’s Oil & Gas regulatory environment. The focus will be on pipeline monitoring regulations - Department of Transportation (DOT) - Pipeline and Hazardous Materials Safety Administration (PHMSA) and American Petroleum Institute (API) recommended practices: API 1164 (Supervisory Control and Data Acquisition System - SCADA Security), API 1165 (SCADA Displays), API 1167 (SCADA Alarm Management) and API 1168 (Control Room Management). Regarding Supervisory Control and Data Acquisition Systems (SCADA) security, this includes not only IT infrastructure such as computers and network related appliances, but also other equipment such as programmable logic controllers (PLCs) and Remote Terminal Units (RTUs) depending on the system architecture. The cyber-security threat has become a real issue related to critical infrastructure protection, and physical or human-risk issues. Understanding the systems vulnerabilities that could impact the availability of the control system and the facilities it controls is key. On the Control Room Management side, current PHMSA regulatory framework, a human factors plan is required to ensure control systems match human capabilities and limitations. Pipeline operators are since required to inform controllers of their roles and responsibilities, and carefully assess the implications on each of the following SCADA areas: alarm management, documentation and procedures, HMI displays, shift handover, fatigue management, change management and training. Therefore with the pipeline industry facing increasing regulatory scrutiny and ever-increasing cyber-threats, it’s more important than ever for companies to improve their plans, documentation, and processes. Companies around the globe are converging and prioritizing Security and Control, establishing long-term strategy to meet and sustain regulatory compliance to remain competitive, increase efficiency and productivity. The authors, working jointly with the client and industry leaders, have developed compliance methods and procedures to deal with these challenges. After applying these methods and procedures, the observed results were translated into smoother transitions to a centralized SCADA control center, which not only meet regulatory safety guidelines and PHMSA regulation, but also added value and efficiency to the control center operations.


2014 ◽  
Vol 519-520 ◽  
pp. 160-163
Author(s):  
Yuan Cheng Li ◽  
Wen Zhi Li ◽  
Li Qun Yang

This paper proposes a protection mechanism called trust system. The purpose of this article is to enhance supervisory control and data-acquisition (SCADA) security with minimal impact on our existing power communication systems. This paper concentrates on placing trust system into our existing power system and creates new security system implementations to increase its flexibility. What’s more, the SCADA security issues between electric utilities are also discussed.


Author(s):  
Sadhana Patidar ◽  
Priyanka Parihar ◽  
Chetan Agrawal

Now-a-days with growing applications over internet increases the security issues over network. Many security applications are designed to cope with such security concerns but still it required more attention to improve speed as well accuracy. With advancement of technologies there is also evolution of new threats or attacks in network. So, it is required to design such detection system that can handle new threats in network. One of the network security tools is intrusion detection system which is used to detect malicious data packets. Machine learning tool is also used to improve efficiency of network-based intrusion detection system. In this paper, an intrusion detection system is proposed with an application of machine learning tools. The proposed model integrates feature reduction, affinity clustering and multilevel Ensemble Support Vector Machine. The proposed model performance is analyzed over two datasets i.e. NSL-KDD and UNSW-NB 15 dataset and achieved approx. 12% of efficiency over other existing work.


Sign in / Sign up

Export Citation Format

Share Document