scholarly journals Autonomic Computing Architecture for SCADA Cyber Security

2020 ◽  
pp. 543-557
Author(s):  
Sajid Nazir ◽  
Shushma Patel ◽  
Dilip Patel

Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.

Author(s):  
Sajid Nazir ◽  
Shushma Patel ◽  
Dilip Patel

Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.


Author(s):  
Sajid Nazir ◽  
Shushma Patel ◽  
Dilip Patel

This chapter proposes an autonomic computing security framework for protecting cloud-based supervisory control and data acquisition (SCADA) systems against cyber threats. Autonomic computing paradigm is based on intelligent computing that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operations. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved from isolated systems into a complex, highly connected systems requiring constant availability. The migration of such systems from in-house to cloud infrastructures has gradually gained prominence. The deployments over cloud infrastructures have brought new cyber security threats, challenges, and mitigation opportunities. SCADA deployment to cloud makes it imperative to adopt newer architectures and measures that can proactively and autonomously react to an impending threat.


Author(s):  
Haibin Zhu

Autonomic Computing is an emerging computing paradigm used to create computer systems capable of self-management in order to overcome the rapidly growing complexity of computing systems management. To possess self-* properties, there must be mechanisms to support self-awareness, that is an autonomic system should be able to perceive the abnormality of its components. After abnormality is checked, processes of self-healing, self-configuration, self-optimization, and self-protection must be completed to guarantee the system works correctly and continuously. In role-based collaboration (RBC), roles are the major media for interaction, coordination, and collaboration. A role can be used to check if a player behaves well or not. This paper investigates the possibility of using roles and their related mechanisms to diagnose the behavior of agents, and facilitate self-* properties of a system.


Energies ◽  
2020 ◽  
Vol 13 (8) ◽  
pp. 2106 ◽  
Author(s):  
Mostafa Kermani ◽  
Domenico Luca Carnì ◽  
Sara Rotondo ◽  
Aurelio Paolillo ◽  
Francesco Manzo ◽  
...  

Currently, despite the use of renewable energy sources (RESs), distribution networks are facing problems, such as complexity and low productivity. Emerging microgrids (MGs) with RESs based on supervisory control and data acquisition (SCADA) are an effective solution to control, manage, and finally deal with these challenges. The development and success of MGs is highly dependent on the use of power electronic interfaces. The use of these interfaces is directly related to the progress of SCADA systems and communication infrastructures. The use of SCADA systems for the control and operation of MGs and active distribution networks promotes productivity and efficiency. This paper presents a real MG case study called the LAMBDA MG testbed laboratory, which has been implemented in the electrical department of the Sapienza University of Rome with a centralized energy management system (CEMS). The real-time results of the SCADA system show that a CEMS can create proper energy balance in a LAMBDA MG testbed and, consequently, minimize the exchange power of the LAMBDA MG and main grid.


Author(s):  
Haibin Zhu

Autonomic Computing is an emerging computing paradigm used to create computer systems capable of self-management in order to overcome the rapidly growing complexity of computing systems management. To possess self-* properties, there must be mechanisms to support self-awareness, that is an autonomic system should be able to perceive the abnormality of its components. After abnormality is checked, processes of self-healing, self-configuration, self-optimization, and self-protection must be completed to guarantee the system works correctly and continuously. In role-based collaboration (RBC), roles are the major media for interaction, coordination, and collaboration. A role can be used to check if a player behaves well or not. This paper investigates the possibility of using roles and their related mechanisms to diagnose the behavior of agents, and facilitate self-* properties of a system.


2021 ◽  
Vol 13 (9) ◽  
pp. 4950
Author(s):  
Stelian Brad ◽  
Mircea Murar ◽  
Grigore Vlad ◽  
Emilia Brad ◽  
Mariuța Popanton

Capacity to remotely monitor and control systems for waste-water treatment and to provide real time and trustworthy data of system’s behavior to various stakeholders is of high relevance. SCADA systems are used to undertake this job. SCADA solutions are usually conceptualized and designed with a major focus on technological integrability and functionality. Very little contributions are brought to optimize these systems with respect to a mix of target functions, especially considering a lifecycle perspective. In this paper, we propose a structured methodology for optimizing SCADA systems from a lifecycle perspective for the specific case of waste-water treatment units. The methodology embeds techniques for handling entropy in the design process and to assist engineers in designing effective solutions in a space with multiple constrains and conflicts. Evolutionary multiple optimization algorithms are used to handle this challenge. After the foundation of the theoretical model calibrated for the specific case of waste-water treatment units, a practical example illustrates its applicability. It is shown how the model can lead to a disruptive solution, which integrates cloud computing, IoT, and data analytics in the SCADA system, with some competitive advantages in terms of flexibility, cost effectiveness, and increased value added for both integrators and beneficiaries.


2013 ◽  
Vol 21 (5) ◽  
pp. 1679-1693 ◽  
Author(s):  
Saurabh Amin ◽  
Xavier Litrico ◽  
S. Shankar Sastry ◽  
Alexandre M. Bayen

Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


Sign in / Sign up

Export Citation Format

Share Document