Literatura académica sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)"

1

Ara, Anees. "Security in Supervisory Control and Data Acquisition (SCADA) based Industrial Control Systems: Challenges and Solutions". IOP Conference Series: Earth and Environmental Science 1026, n.º 1 (1 de mayo de 2022): 012030. http://dx.doi.org/10.1088/1755-1315/1026/1/012030.

Texto completo
Resumen
Abstract Industrial control systems (ICS) play a vital role in monitoring and controlling the plants like power grids, oil and gas industries, manufacturing industries, and nuclear power plants. Present research and development in information and communication technologies have changed the domains of industrial control systems from traditional electromagnetic to network- based digital systems. This domain shift has created better interfaces for communication between physical processes and the control units. Eventually, making the complex process of monitoring and controlling the industries easier, with the help of internet connections and computing technologies. The field instruments such as sensors and actuators and the physical processes in industries are controlled and monitored by programmable logic controllers (PLC), remote telemetric units (RTU), and supervisory control and data acquisition systems (SCADA) with the help of communication protocols. The seamless integration of the information technologies (IT) and operational technologies (OT) make the management of the industrial environment foster. However, the inclusion of new technologies that increase the number of internet connections, the new communication protocols, and interfaces that run on open-source software, brings up new threats and challenges in addition to existing vulnerabilities in these classical legacy-based heterogeneous hardware and software systems. Due to the increase in the number of security incidents on critical infrastructures, the security considerations for SCADA systems/ICS are gaining interest among researchers. In this paper, we provide a description of SCADA/ICS components, architecture, and communication protocols. Additionally, we discuss details of existing vulnerabilities in hardware, software, and communication protocols. Further, we highlight some prominent security incidents and their motives behind them. We analyse the existing state of OT and IT security in SCADA systems by classifying the SCADA components among them. Finally, we provide security recommendations based on current trends and also discuss open research problems in SCADA security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

L, Rajesh y Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol". Security and Communication Networks 2021 (27 de septiembre de 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.

Texto completo
Resumen
Industrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process plants. Legacy SCADA systems are working in isolated networks and using proprietary communication protocols which made them less exposed to cyber threats. In recent times, these ICS systems have been connected to Internet and corporate networks for data sharing and remote monitoring. They are also using open protocols and operating systems. This leads to vulnerabilities of the system to cyberattacks. Cybersecurity threats are more prevalent than ever in ICS systems. These attacks may be external or internal. Modbus is a widely deployed communication protocol for SCADA communications. There is no security in design of Modbus protocol, and it is vulnerable to numerous cyberattacks. In this paper, we worked for False Command Injection attack, False Access Injection attack, and replay attacks on Modbus protocol. Initially, a real-time SCADA testbed was set up, and we envisaged the impact of these attacks on Modbus protocol data using the testbed. In this work, we used local area network (LAN) environment only for simulating the attacks. We assumed that the attacks penetrated the LAN network. We proposed and developed (a) a method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and (b) a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC). Numbers of attacks were simulated and the performance of the method was measured using attack block rate (ABR). It blocked 97% of malicious Modbus transactions or attacks to reach the PLC. It protects SCADA systems from attackers, which is a core component of industrial control systems. The solution enhanced the security of SCADA systems with Modbus protocol.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Coffey, Kyle, Richard Smith, Leandros Maglaras y Helge Janicke. "Vulnerability Analysis of Network Scanning on SCADA Systems". Security and Communication Networks 2018 (13 de marzo de 2018): 1–21. http://dx.doi.org/10.1155/2018/3794603.

Texto completo
Resumen
Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICSs) have controlled the regulation and management of Critical National Infrastructure environments for decades. With the demand for remote facilities to be controlled and monitored, industries have continued to adopt Internet technology into their ICS and SCADA systems so that their enterprise can span across international borders in order to meet the demand of modern living. Although this is a necessity, it could prove to be potentially dangerous. The devices that make up ICS and SCADA systems have bespoke purposes and are often inherently vulnerable and difficult to merge with newer technologies. The focus of this article is to explore, test, and critically analyse the use of network scanning tools against bespoke SCADA equipment in order to identify the issues with conducting asset discovery or service detection on SCADA systems with the same tools used on conventional IP networks. The observations and results of the experiments conducted are helpful in evaluating their feasibility and whether they have a negative impact on how they operate. This in turn helps deduce whether network scanners open a new set of vulnerabilities unique to SCADA systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Rao, Nandan, Shubhra Srivastava y Sreekanth K.S. "PKI Deployment Challenges and Recommendations for ICS Networks". International Journal of Information Security and Privacy 11, n.º 2 (abril de 2017): 38–48. http://dx.doi.org/10.4018/ijisp.2017040104.

Texto completo
Resumen
Different types of Control Systems used for Industrial production are broadly called Industrial Control Systems (ICS) (n.d.). These include Supervisory Control and Data Acquisition (SCADA) Systems and Distributed Control Systems (DCS). ICS typically perform the “Command and Control” operations required for smooth functioning of machines in industrial production. They are widely used in Critical infrastructures such as power generation and distribution systems, Oil and Gas plants, Chemical factories and various other manufacturing facilities. Traditionally, ICS used proprietary protocols and operated in isolation. Perimeter security was considered enough as the only means to compromise these systems was via physical access to the systems. However, increased standardization, open architecture adoption and connectivity to enterprise networks as well as internet opened up these systems for a wide range of audience and enabled remote attacks. In this new operation landscape, it is imperative that newer means of securing the networks are adopted continuously. One of the security considerations for the ICS networks is the communication paths used by these networks. Public Key Infrastructure (PKI) (n.d.) plays a key role in securing the communication of ICS networks. Using Digital Certificates, PKI provides a mechanism to verify the identity of all the entities on a network and also ensures that the information is shared securely between communicating entities. PKI is a proven mechanism for secure communication and is widely used in many organizations. However, PKI as a solution to ICS security is challenging due to factors such as resource constrained environments, bandwidth considerations and hard real-time communication requirements. This paper intends to focus on key challenges in Digital Certificate management and correct deployment of PKI in ICS networks and will also present recommendations to overcome these challenges without compromising the basic functionalities of ICS.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Yin, Xiao Chun, Zeng Guang Liu, Lewis Nkenyereye y Bruce Ndibanje. "Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach". Sensors 19, n.º 22 (14 de noviembre de 2019): 4952. http://dx.doi.org/10.3390/s19224952.

Texto completo
Resumen
We present an innovative approach for a Cybersecurity Solution based on the Intrusion Detection System to detect malicious activity targeting the Distributed Network Protocol (DNP3) layers in the Supervisory Control and Data Acquisition (SCADA) systems. As Information and Communication Technology is connected to the grid, it is subjected to both physical and cyber-attacks because of the interaction between industrial control systems and the outside Internet environment using IoT technology. Often, cyber-attacks lead to multiple risks that affect infrastructure and business continuity; furthermore, in some cases, human beings are also affected. Because of the traditional peculiarities of process systems, such as insecure real-time protocols, end-to-end general-purpose ICT security mechanisms are not able to fully secure communication in SCADA systems. In this paper, we present a novel method based on the DNP3 vulnerability assessment and attack model in different layers, with feature selection using Machine Learning from parsed DNP3 protocol with additional data including malware samples. Moreover, we developed a cyber-attack algorithm that included a classification and visualization process. Finally, the results of the experimental implementation show that our proposed Cybersecurity Solution based on IDS was able to detect attacks in real time in an IoT-based Smart Grid communication environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Truong, Dinh-Nhon, Mi-Sa Nguyen Thi, Van-Thuyen Ngo y An-Quoc Hoang. "Development of the Monitoring Program for an Integrated Small-Scale Wind and Solar Systems based on IoT Technology". Journal of Science and Technology: Issue on Information and Communications Technology 19, n.º 12.2 (25 de enero de 2022): 26. http://dx.doi.org/10.31130/ict-ud.2021.139.

Texto completo
Resumen
For monitoring the energy supply from the hybrid small-scale wind turbine generator (WTG) and rooftop solar Photovoltage (PV) systems, this paper presents the design of a management program of the studied system based on the Internet of Things (IoT) technology. The proposed studied system consists of digital power meters that communicate wirelessly to the Programmable Logic Controller (PLC) through the ZigBee communication standard. By using a free cloud platform will greatly facilitate the Supervisory Control and Data Acquisition (SCADA) interface design work for a Human Machine Interface (HMI) or mobile phone. This system configuration may be easy to be fitted for collecting electrical information such as voltage, current, power, frequency of the system to be monitored. This is one of the cheap solutions deployed in small-scale hybrid power systems (HPS) or factories because wireless communication is very convenient in construction and installation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Chen, Shuo, Falko Ebe, Jeromie Morris, Heiko Lorenz, Christoph Kondzialka y Gerd Heilscher. "Implementation and Test of an IEC 61850-Based Automation Framework for the Automated Data Model Integration of DES (ADMID) into DSO SCADA". Energies 15, n.º 4 (19 de febrero de 2022): 1552. http://dx.doi.org/10.3390/en15041552.

Texto completo
Resumen
As a result of the energy transition, an increasing number of Decentralized Energy Systems (DES) will be installed in the distribution grid in the future. Accordingly, new methods to systematically integrate the growing DES in distribution power systems must be developed utilizing the constantly evolving Information and Communication Technologies (ICT). This paper proposes the Automated Data Model Integration of DES (ADMID) approach for the integration of DES into the ICT environment of the Distribution System Operator (DSO). The proposed ADMID utilizes the data model structure defined by the standard-series IEC 61850 and has been implemented as a Python package. The presented two Use Cases focus on the Supervisory Control and Data Acquisition (SCADA) on the DSO operational level following a four-stage test procedure, while this approach has enormous potential for advanced DSO applications. The test results obtained during simulation or real-time communication to field devices indicate that the utilization of IEC 61850-compliant data models is eligible for the proposed automation approach, and the implemented framework can be a considerable solution for the system integration in future distribution grids with a high share of DES. As a proof-of-concept study, the proposed ADMID approach requires additional development with a focus on the harmonization with the Common Information Model (CIM), which could significantly improve its functional interoperability and help it reach a higher Technology Readiness Level (TRL).
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

George, Joshy y Stanislaw Paul MAJ. "The Impact of Information Technology on Industrial Automation – A Critical Evaluation". Modern Applied Science 12, n.º 2 (30 de enero de 2018): 142. http://dx.doi.org/10.5539/mas.v12n2p142.

Texto completo
Resumen
Information Technology (IT) now impacts on all aspects of modern society (personal, commercial and industrial). The advances in IT may broadly be categorized into the following subsets of technologies: integrated circuits, communications, software engineering and Graphical User Interfaces. In the context of Industrial Automation (IA) it can be seen that some communication protocols, for example Modbus which was first introduced in the 1970’s, has under gone numerous updates driven by IT developments with associated considerable improvements in performance and capability. By contrast some, for example HART which was first introduced in the 1980’s, whilst it has undergone revisions it does not fully utilize the capabilities that IT can provide. For higher level IA systems they can be divided into four generations which can each be associated with specific IT developments. The first generation IA system is based on simple Proportional, Integral and Derivative (PID) controllers and ruggedized microprocessor based Programmable Logic Controllers (PLC). IA systems expanded in both complexity and scope through these generations to include Distributed Control Systems (DCS’s) and Supervisory Control and Data Acquisition (SCADA). The fifth generation of IA systems may be associated with IT developments both on and over the horizon that include: Cloud Computing, Cyber Security and Internet of Things. Responses to these technologies include: General Electric (GE) Predix and Siemens MindSphere. Regardless of how IA is categorized there can be no doubt that IT is responsible for major technical developments – a process that is likely to continue.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Wang, Hao, Nathan Lau y Ryan M. Gerdes. "Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis". Human Factors: The Journal of the Human Factors and Ergonomics Society 60, n.º 5 (17 de abril de 2018): 699–718. http://dx.doi.org/10.1177/0018720818769250.

Texto completo
Resumen
Objective: The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Background: Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. Method: We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means–ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. Results: The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Conclusion: Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Application: Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Tsochev, Georgi, Radoslav Yoshinov y Oleg Iliev. "Key Problems of the Critical Information Infrastructure through Scada Systems Research". SPIIRAS Proceedings 18, n.º 6 (29 de noviembre de 2019): 1333–56. http://dx.doi.org/10.15622/sp.2019.18.6.1333-1356.

Texto completo
Resumen
In the current age, cyber security is an essential element of any information system. A key aspect is in the critical information infrastructure, where information security has become a top priority for information and network security experts. The interoperability of an ICT infrastructure with other components of it is an important aspect of its life cycle. Because Supervisory Control and Data Acquisition (SCADA) systems form part of the critical infrastructure, their cyber protection is particularly important in strategically important industrial and infrastructure sites — power plants, refineries, oil pipelines, treatment plants, manufacturing facilities, communications and transportation infrastructures. Along with the advancement of technology, the increasing number of Scada devices available online, the vulnerability of the sectors controlled by them has also increased. In the world of Internet of things (everything), the end devices cause a new wave of possible vulnerabilities in SCADA. They become the new places for attacks and breaches trough wich the system may be accessed or even compromised. There are a number of critical infrastructures in the Community whose disruption or destruction would have significant cross-border implications for more than one sector as a result of the interdependence of interconnected infrastructures. Such European critical infrastructures have been established and launched under a common procedure developed by the European Commission, with security requirements assessed according to a common minimum approach. The present article exposes and examines the critical infrastructures of the European Union and Bulgaria. Trough presenting the structure of a Scada system the vulnerabilities and the various possibilities of attacking it were analised. As an example, a specific case based on trees has been considered, and the obtained results were summarized and visualized. The consequences were analized and respecctive conclusion was done.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)"

1

ALSHAYA, SHAYA ABDULLAH. "A Comprehensive Cyber Security Enhancing Strategy for Industrial Control Systems in Oil Industry". Doctoral thesis, 2017. http://hdl.handle.net/2158/1079706.

Texto completo
Resumen
Industrial Control Systems (ICS) play a critical operational role in modern industrial sectors. Businesses depend on this automated control system for various operations to manage processes in the most benecial manner. Information and Communication Technology (ICT) has enhanced ICS development and implementation. However, such automation advancement may also create many new opportunities for cyberattacks. Certain industries, such as the oil industry within Gulf Cooperation Council (GCC) countries, have begun renewing industrial control systems and related management to counteract cyber-attacks more eectively. The technological system framework which is herewith mainly taken as reference are the Supervisory Control and Data Acquisition (SCADA) systems. The analysis and synthesis made through this Ph.D. thesis account for both technical and human factors impinging on cyber-security system performance. A comprehensive approach has thus adopted to qualify relevant scientic technical contributions available from the literature, as well as to exploit outcomes of actual direct experiences of the involved companies. For such a comprehensive approach some basic analytical contributions have been rst provided for: i) qualifying related scientic technical advancements within the cyber-security literature; ii) performing subjective testing within the community of IT operators of ICS, concerned with made experience and human behavior aecting cyber-security. Such analysis is tuned with the objective of dening and adopting an enhanced comprehensive cyber-security policy within enterprise for ICS operation, which properly accounts also for relevance of human factors. Therefore, nal made contribution is just denition and proposal of appropriate guidelines for such a purpose. Research activity thus carried out is framed with an interdisciplinary context, as needed to innovate enterprise cyber-security management, including specic support and management of enterprise human resources.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)"

1

Johnsen, Stig O. "Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management". En Securing Critical Infrastructures and Critical Control Systems, 286–300. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2659-1.ch012.

Texto completo
Resumen
This chapter describes vulnerabilities related to safety and security in distributed process control systems integrated with information and communication technology (ICT). The author describe key vulnerabilities and how to mitigate these vulnerabilities by current best practices, which have worked in an industrial setting in Norway. Distributed process control systems are denoted as SCADA systems, i.e. supervisory control and data acquisition systems. Increased networking and increased use of ICT impacts the complexity and vulnerability of the SCADA systems. To improve safety and security, there must be a focus on systematic knowledge generation between ICT and process experts and a focus on exploring resilience as a strategy to manage risks and support continuity of operations (resilience seen as the ability to bounce back and sustain operations). Best practices in risk management in this area are to establish policies, improve risk awareness, perform risk assessment in collaboration between ICT and SCADA professionals, focus on segregation of networks, focus on active protection against malicious software, improve reporting and sharing of incidents, and establish and explore disaster/recovery plans. In addition, there should be focus on certification and testing of components in ICT and SCADA systems and improvement of resilience to mitigate uncertainty and complexity.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Industrial Control Systems (ICS) Information and Communication Technology (ICT) Supervisory Control and Data Acquisition (SCADA)"

1

Nikolić, Vojkan, Zoran Stević, Stefana Janićijević y Dragan Kreculj. "Possibilities of IIOT application platforms in the electrical power systems". En 8th International Conference on Renewable Electrical Power Sources. SMEITS, 2020. http://dx.doi.org/10.24094/mkoiee.020.8.1.255.

Texto completo
Resumen
Nowadays in the market there are different Internet of Things (IoT) devices, that are used in electrical power systems. Such IoT devices can be physically, or virtually networked, with interoperable communication protocols and intelligent interfaces. IoT technologies provide their connection to the internet, as well as connection to special services and applications. Electrical power systems have traditional Enterprise resource planning (ERP), Supervisory control and data acquisition (SCADA), Distributed control systems (DCSs), as well as traditional industrial automation stack to achieve functional integration between the company management level and the production level. Industrial IoT (IIoT) platforms should overcome the gap between Information technology (IT) and Operational technology (OT) environments. These platforms providing a more suitable data architecture for the modern industrial automation stack. The paper presents the overview of one modern solution with the Claroty IIoT platform. Claroty delivers comprehensive and reduces the complexity of OT security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Stamatescu, Iulia, Grigore Stamatescu, Nicoleta Arghira, Vasile Calofir, Ioana Fagarasan y Sergiu stelian Iliescu. "DEVELOPMENT AND IMPACT ASSESSMENT OF CLOUD-BASED INDUSTRIAL AUTOMATION TECHNOLOGY CURRICULA". En eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-214.

Texto completo
Resumen
Preparing and disseminating knowledge in the field of industrial automation technology for the training of future engineers and researchers poses specific challenges for leveraging cloud-based solutions in an eLearning context. This relates mainly to the need of enabling access to real or simulated hardware and processes besides courseware and handbooks with exercises and examples. Also, going outside the closed environment of the laboratory, teaching practices and outcomes can be vastly enhanced by cloud environments which incorporate mutual knowledge from various stakeholders in the learning process, curated by the end-users. The methods and tools that enable such an approach are reviewed from an industrial automation perspective along with alternative paths to educational achievement in this field. Student engagement is also tracked and analyzed by using specific tools and platforms in order to best tailor the content and delivery method to their benefit. We discuss the key-points, achievements and program structure of the recent collaboration between the Laboratory of Industrial Information Systems within the Department of Automatic Control and Industrial Informatics, Faculty of Automatic Control and Computers, University Politehnica of Bucharest and the Phoenix Contact Corporation to enhance teaching materials and improve collaboration among partner institutions at the university and student level, on related to topics such as programmable logic controllers, human-machine interface, industrial communication networks and supervisory control and data acquisition programs (SCADA). An outlook for program development and means to increase the impact of such initiatives, by leveraging novel paradigms in eLearning and software for education, are also presented and evaluated.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía