industrial control system
Recently Published Documents


TOTAL DOCUMENTS

406
(FIVE YEARS 172)

H-INDEX

13
(FIVE YEARS 3)

2022 ◽  
Vol 2022 ◽  
pp. 1-20
Author(s):  
Chun-Nen Huang ◽  
Shahzaib Ashraf ◽  
Noor Rehman ◽  
Saleem Abdullah ◽  
Azmat Hussain

Industrial control system (ICS) attacks are usually targeted attacks that use the ICS entry approach to get a foothold within a system and move laterally throughout the organization. In recent decades, powerful attacks such as Stuxnet, Duqu, Flame, and Havex have served as wake-up calls for industrial units. All organizations are faced with the rise of security challenges in technological innovations. This paper aims to develop aggregation operators that can be used to address the decision-making problems based on a spherical fuzzy rough environment. Meanwhile, some interesting properties of idempotence, boundedness, and monotonicity for the proposed operators are analyzed. Moreover, we use this newly constructed framework to select ICS security suppliers and validate its acceptability. Furthermore, a different test has been performed based on a new operator to strengthen the suggested approach. Additionally, comparative analysis based on the novel extended TOPSIS method is presented to demonstrate the superiority of the proposed technique. The results show that the conventional approach has a larger area for information representation, better adaptability to the evaluation environment, and higher reliability of the evaluation results.


2022 ◽  
Vol 355 ◽  
pp. 03067
Author(s):  
Kai Jin ◽  
Zhanji Niu ◽  
Jieping Liu ◽  
Jinxue Bai ◽  
Lei Zhang

The relationship between industrial control system and Internet is becoming closer and closer, and its network security has attracted much attention. Penetration testing is an active network intrusion detection technology, which plays an indispensable role in protecting the security of the system. This paper mainly introduces the principle of penetration testing, summarizes the current cutting-edge penetration testing technology, and looks forward to its development.


2022 ◽  
Vol 412 ◽  
pp. 126539
Author(s):  
Weiping Wang ◽  
Chunyang Wang ◽  
Zhen Wang ◽  
Manman Yuan ◽  
Xiong Luo ◽  
...  

Energies ◽  
2021 ◽  
Vol 15 (1) ◽  
pp. 218
Author(s):  
Mohammed Alghassab

Monitoring and control systems in the energy sector are specialized information structures that are not governed by the same information technology standards as the rest of the world’s information systems. Such industrial control systems are also used to handle important infrastructures, including smart grids, oil and gas facilities, nuclear power plants, water management systems, and so on. Industry equipment is handled by systems connected to the internet, either via wireless or cable connectivity, in the present digital age. Further, the system must work without fail, with the system’s availability rate being of paramount importance. Furthermore, to certify that the system is not subject to a cyber-attack, the entire system must be safeguarded against cyber security vulnerabilities, threats, and hazards. In addition, the article looks at and evaluates cyber security evaluations for industrial control systems, as well as their possible impact on the accessibility of industrial control system operations in the energy sector. This research work discovers that the hesitant fuzzy-based method of the Analytic Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is an operational procedure for estimating industrial control system cyber security assessments by understanding the numerous characteristics and their impacts on cyber security industrial control systems. The author evaluated the outputs of six distinct projects to determine the quality of the outcomes and their sensitivity. According to the results of the robustness analysis, alternative 1 shows the utmost effective cybersecurity project for the industrial control system. This research work will be a conclusive reference for highly secure and managed monitoring and control systems.


2021 ◽  
Author(s):  
KLAEHN BURKES ◽  
HARRISON HOWELL ◽  
AJAY TIWARI ◽  
DILLON TAUSCHER

Sign in / Sign up

Export Citation Format

Share Document