Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems

Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, d...

Full description

Saved in:
Bibliographic Details
Main Authors: Mubarak, Sinil, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana, Khan, Sheroz, Islam, Md. Rafiqul
Format: Article
Language:English
Published: Institute of Advanced Scientific Research 2019
Subjects:
Online Access:http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf
http://irep.iium.edu.my/71214/
http://www.jardcs.org/abstract.php?id=23
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.71214
record_format dspace
spelling my.iium.irep.712142019-07-16T10:15:48Z http://irep.iium.edu.my/71214/ Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems Mubarak, Sinil Habaebi, Mohamed Hadi Abdul Rahman, Farah Diyana Khan, Sheroz Islam, Md. Rafiqul TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, data logging, alarm and diagnostic functions. The advancement in technology for connectivity in communication protocols has resulted the system to be more vulnerable to cyber-attacks. The classifications of various attacks along with the intrusions detection methods have been highlighted. Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed. Institute of Advanced Scientific Research 2019-04-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf Mubarak, Sinil and Habaebi, Mohamed Hadi and Abdul Rahman, Farah Diyana and Khan, Sheroz and Islam, Md. Rafiqul (2019) Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems. Journal of Advanced Research in Dynamical and Control Systems, 11 (1). pp. 180-188. ISSN 1943-023X http://www.jardcs.org/abstract.php?id=23
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Mubarak, Sinil
Habaebi, Mohamed Hadi
Abdul Rahman, Farah Diyana
Khan, Sheroz
Islam, Md. Rafiqul
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
description Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, data logging, alarm and diagnostic functions. The advancement in technology for connectivity in communication protocols has resulted the system to be more vulnerable to cyber-attacks. The classifications of various attacks along with the intrusions detection methods have been highlighted. Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.
format Article
author Mubarak, Sinil
Habaebi, Mohamed Hadi
Abdul Rahman, Farah Diyana
Khan, Sheroz
Islam, Md. Rafiqul
author_facet Mubarak, Sinil
Habaebi, Mohamed Hadi
Abdul Rahman, Farah Diyana
Khan, Sheroz
Islam, Md. Rafiqul
author_sort Mubarak, Sinil
title Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
title_short Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
title_full Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
title_fullStr Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
title_full_unstemmed Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
title_sort cyber attacks analysis and mitigation with machine learning techniques in ics scada systems
publisher Institute of Advanced Scientific Research
publishDate 2019
url http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf
http://irep.iium.edu.my/71214/
http://www.jardcs.org/abstract.php?id=23
_version_ 1643619976624472064