Architecture and security of SCADA systems: A review

被引:79
|
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT, Khosla Sch Informat Technol, Delhi, India
[2] IIT, Dept Comp Sci, Delhi, India
关键词
SCADA systems security; Critical infrastructure; Cyber-physical systems; IIoT; SCADA attacks; IDS; Testbed; INTRUSION DETECTION; MODIFICATION ATTACKS; CYBER SECURITY; METHODOLOGY; MIGRATION; LESSONS; DRIVEN; MODEL;
D O I
10.1016/j.ijcip.2021.100433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System (ICS). SCADA systems have become an essential part of automated control and monitoring of Critical Infrastructures (CI). Modern SCADA sys-tems have evolved from standalone systems into sophisticated, complex, open systems connected to the Internet. This geographically distributed modern SCADA system is more vulnerable to threats and cyber attacks than traditional SCADA. Traditional SCADA systems were less exposed to Internet threats as they operated on isolated networks. Over the years, an increase in the number of cyber-attacks against the SCADA systems seeks security researchers' attention towards their security. In this review paper, we first review the SCADA system architectures and comparative analysis of proposed/implemented communica-tion protocols, followed by attacks on such systems to understand and highlight the evolving security needs for SCADA systems. A short investigation of the current state of intrusion detection techniques in SCADA systems is done, followed by a brief study of testbeds for SCADA systems. The cloud and Internet of things (IoT) based SCADA systems are studied by analyzing modern SCADA systems' architecture. In the end, the review paper highlights the critical research problems that need to be resolved to close the security gaps in SCADA systems. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Towards Security and Privacy of SCADA Systems through Decentralized Architecture
    Rivera, Abel O. Gomez
    Tosh, Deepak K.
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 1224 - 1229
  • [2] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [3] Autonomic computing architecture for SCADA cyber security
    Nazir S.
    Patel S.
    Patel D.
    1600, IGI Global (11): : 66 - 79
  • [4] A Trust System Architecture for SCADA Network Security
    Coates, Gregory M.
    Hopkinson, Kenneth M.
    Graham, Scott R.
    Kurkowski, Stuart H.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 158 - 169
  • [5] SCADA security: a review and enhancement for DNP3 based systems
    Peeyush Jain
    Paritosh Tripathi
    CSI Transactions on ICT, 2013, 1 (4) : 301 - 308
  • [6] Taxonomy of SCADA systems security testbeds
    Di Pietro, Antonio
    Panzieri, Stefano
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2014, 10 (3-4) : 288 - 306
  • [7] SCASS: Breaking into SCADA Systems Security
    d'Ambrosio, Nicola
    Capodagli, Giulio
    Perrone, Gaetano
    Romano, Simon Pietro
    COMPUTERS & SECURITY, 2025, 151
  • [8] Improving security for SCADA control systems
    Hentea, Mariana
    Interdisciplinary Journal of Information, Knowledge, and Management, 2008, 3 : 73 - 86
  • [9] SCADA Systems: Security Concerns and Countermeasures
    Salvador, Lourdes Cecilia Ruiz
    Nguyen Huu Phuoc Dai
    Zoltan, Rajnai
    2023 IEEE 21ST WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, SAMI, 2023, : 251 - 254
  • [10] A Model for Security Management of SCADA Systems
    dos Anjos, Ivano M.
    Brito, Agostinho M., Jr.
    Motta Pires, Paulo S.
    2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 448 - 451