Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, d...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Scientific Research
2019
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf http://irep.iium.edu.my/71214/ http://www.jardcs.org/abstract.php?id=23 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.71214 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.712142019-07-16T10:15:48Z http://irep.iium.edu.my/71214/ Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems Mubarak, Sinil Habaebi, Mohamed Hadi Abdul Rahman, Farah Diyana Khan, Sheroz Islam, Md. Rafiqul TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, data logging, alarm and diagnostic functions. The advancement in technology for connectivity in communication protocols has resulted the system to be more vulnerable to cyber-attacks. The classifications of various attacks along with the intrusions detection methods have been highlighted. Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed. Institute of Advanced Scientific Research 2019-04-01 Article PeerReviewed application/pdf en http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf Mubarak, Sinil and Habaebi, Mohamed Hadi and Abdul Rahman, Farah Diyana and Khan, Sheroz and Islam, Md. Rafiqul (2019) Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems. Journal of Advanced Research in Dynamical and Control Systems, 11 (1). pp. 180-188. ISSN 1943-023X http://www.jardcs.org/abstract.php?id=23 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Mubarak, Sinil Habaebi, Mohamed Hadi Abdul Rahman, Farah Diyana Khan, Sheroz Islam, Md. Rafiqul Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
description |
Supervisory control and data acquisition (SCADA) system is a computer based system implemented to control the physical processes which enhances the operational efficiency, cost reduction and energy consumption. It supervises physical process by collecting data from sensors and performs monitoring, data logging, alarm and diagnostic functions. The advancement in technology for connectivity in communication protocols has resulted the system to be more vulnerable to cyber-attacks. The classifications of various attacks along with the intrusions detection methods have been highlighted. Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed. |
format |
Article |
author |
Mubarak, Sinil Habaebi, Mohamed Hadi Abdul Rahman, Farah Diyana Khan, Sheroz Islam, Md. Rafiqul |
author_facet |
Mubarak, Sinil Habaebi, Mohamed Hadi Abdul Rahman, Farah Diyana Khan, Sheroz Islam, Md. Rafiqul |
author_sort |
Mubarak, Sinil |
title |
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
title_short |
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
title_full |
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
title_fullStr |
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
title_full_unstemmed |
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems |
title_sort |
cyber attacks analysis and mitigation with machine learning techniques in ics scada systems |
publisher |
Institute of Advanced Scientific Research |
publishDate |
2019 |
url |
http://irep.iium.edu.my/71214/1/71214_Cyber%20Attacks%20Analysis%20and%20Mitigation.pdf http://irep.iium.edu.my/71214/ http://www.jardcs.org/abstract.php?id=23 |
_version_ |
1643619976624472064 |