Cyber security of critical infrastructures

被引:74
作者
Maglaras, Leandros A. [1 ,4 ]
Kim, Ki-Hyung [2 ]
Janicke, Helge [1 ]
Ferrag, Mohamed Amine [3 ]
Rallis, Stylianos [4 ]
Fragkou, Pavlina [5 ]
Maglaras, Athanasios [6 ]
Cruz, Tiago J. [7 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Ajou Univ, Suwon, South Korea
[3] Guelma Univ, Dept Comp Sci, Guelma, Algeria
[4] Gen Secretariat Digital Policy, Athens, Greece
[5] TEI Athens, Dept Informat, Athens, Greece
[6] TEI Thessaly, Dept Elect Engn, Larisa, Greece
[7] Univ Coimbra, Dept Informat Engn, Coimbra, Portugal
来源
ICT EXPRESS | 2018年 / 4卷 / 01期
关键词
SCADA systems; Security; SYSTEMS;
D O I
10.1016/j.icte.2018.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. (C) 2018 The Korean Institute of Communications Information Sciences. Publishing Services by Elsevier B.V.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 17 条
  • [11] A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    [J]. ACM COMPUTING SURVEYS, 2014, 46 (04)
  • [12] Naedele M, 2007, PROC 40 ANN HAWAII I, P115
  • [13] Nicholson A, 2012, PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, P188
  • [14] Security and Privacy Challenges in Industrial Internet of Things
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Waidner, Michael
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [15] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [16] Sinha P., 2010, RISKS SECURITY INTER, P1, DOI DOI 10.1109/CRISIS.2010.5764915
  • [17] Zhu Bonnie, 2011, Proceedings of the 2011 IEEE International Conference on Internet of Things and 4th IEEE International Conference on Cyber, Physical and Social Computing (iThings/CPSCom 2011), P380, DOI 10.1109/iThings/CPSCom.2011.34