Autonomic computing architecture for SCADA cyber security

被引:6
|
作者
Nazir S. [1 ]
Patel S. [2 ]
Patel D. [2 ]
机构
[1] Firstco Ltd., London
[2] London South Bank University, London
来源
| 1600年 / IGI Global卷 / 11期
关键词
Autonomic Computing; Cognitive Computing; Critical Infrastructures; Cyber Attacks; Industrial Applications; SCADA Security;
D O I
10.4018/IJCINI.2017100104
中图分类号
学科分类号
摘要
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security. © 2017 IGI Global.
引用
收藏
页码:66 / 79
页数:13
相关论文
共 50 条
  • [31] Cyber-Security for ICS/SCADA: A South African Perspective
    Pretorius, Barend
    van Niekerk, Brett
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (03) : 1 - 16
  • [32] Host-Oriented Approach to Cyber Security for the SCADA Systems
    Lee, Jae-Myeong
    Hong, Sugwon
    2020 6TH IEEE CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'20), 2020, : 151 - 155
  • [33] Cyber Security in communication of SCADA systems using IEC 61850
    Czechowski, Robert
    Wicher, Pawel
    Wiecha, Bernard
    2015 MODERN ELECTRIC POWER SYSTEMS (MEPS), 2015,
  • [34] Results From a SCADA-Based Cyber Security Competition
    Novak, Heath
    Likarish, Dan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 177 - 182
  • [35] A CYBER SECURITY ARCHITECTURE FOR MICROGRID DEPLOYMENTS
    Mohan, Apurva
    Brainard, Gregory
    Khurana, Himanshu
    Fischer, Scott
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 245 - 259
  • [36] IT service management architecture and autonomic computing
    Brittenham, P.
    Cutlip, R. R.
    Draper, C.
    Miller, B. A.
    Choudhary, S.
    Perazolo, M.
    IBM SYSTEMS JOURNAL, 2007, 46 (03) : 565 - 581
  • [37] An Autonomic Computing Architecture for Business Applications
    Kurian, Devasia
    Chelliah, Pethuru Raj
    PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 442 - 447
  • [38] SECURITY ISSUES OF SCADA SYSTEMS IN CLOUD COMPUTING ENVIRONMENT
    Alakbarov, R. G.
    Hashimov, M. A.
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, : 65 - 67
  • [39] Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security"
    Jones, Kevin
    Janicke, Helge
    Facchi, Christian
    Maglaras, Leandros
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 152 - 152
  • [40] Autonomic Computing Technologies for Cyber-Physical Systems
    Chun, Ingeol
    Park, Jeongmin
    Kim, Wontae
    Kang, Woochun
    Lee, Haeyoung
    Park, Seungmin
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1009 - 1014