Architecture and security of SCADA systems: A review

被引:97
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT, Khosla Sch Informat Technol, Delhi, India
[2] IIT, Dept Comp Sci, Delhi, India
关键词
SCADA systems security; Critical infrastructure; Cyber-physical systems; IIoT; SCADA attacks; IDS; Testbed; INTRUSION DETECTION; MODIFICATION ATTACKS; CYBER SECURITY; METHODOLOGY; MIGRATION; LESSONS; DRIVEN; MODEL;
D O I
10.1016/j.ijcip.2021.100433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System (ICS). SCADA systems have become an essential part of automated control and monitoring of Critical Infrastructures (CI). Modern SCADA sys-tems have evolved from standalone systems into sophisticated, complex, open systems connected to the Internet. This geographically distributed modern SCADA system is more vulnerable to threats and cyber attacks than traditional SCADA. Traditional SCADA systems were less exposed to Internet threats as they operated on isolated networks. Over the years, an increase in the number of cyber-attacks against the SCADA systems seeks security researchers' attention towards their security. In this review paper, we first review the SCADA system architectures and comparative analysis of proposed/implemented communica-tion protocols, followed by attacks on such systems to understand and highlight the evolving security needs for SCADA systems. A short investigation of the current state of intrusion detection techniques in SCADA systems is done, followed by a brief study of testbeds for SCADA systems. The cloud and Internet of things (IoT) based SCADA systems are studied by analyzing modern SCADA systems' architecture. In the end, the review paper highlights the critical research problems that need to be resolved to close the security gaps in SCADA systems. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:26
相关论文
共 175 条
[1]  
Adhikari U., 2014, Industrial Control System (ICS) Cyber Attack Datasets
[2]  
Aghamolki HG, 2015, NORTH AMER POW SYMP
[3]  
Alcaraz C., 2011, Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), P527, DOI 10.1109/CloudCom.2011.79
[4]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[5]  
Alshawish H., 2019, ENERGY INFORM, V2, P34
[6]   Virtualization of SCADA testbeds for cybersecurity research: A modular approach [J].
Alves, Thiago ;
Das, Rishabh ;
Werth, Aaron ;
Morris, Thomas .
COMPUTERS & SECURITY, 2018, 77 :531-546
[7]  
[Anonymous], 2012, P 50 ANN SE REG C AC, DOI DOI 10.1145/2184512.2184590
[8]  
[Anonymous], INTRUSION DETECTION, DOI DOI 10.1007/978-0-387-75462-8_12
[9]  
[Anonymous], 2017, National institute of standards and technology
[10]  
[Anonymous], 2001, McGraw-Hill's Encyclopedia of Networking and Telecommunications