Architecture and security of SCADA systems: A review

被引:79
|
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT, Khosla Sch Informat Technol, Delhi, India
[2] IIT, Dept Comp Sci, Delhi, India
关键词
SCADA systems security; Critical infrastructure; Cyber-physical systems; IIoT; SCADA attacks; IDS; Testbed; INTRUSION DETECTION; MODIFICATION ATTACKS; CYBER SECURITY; METHODOLOGY; MIGRATION; LESSONS; DRIVEN; MODEL;
D O I
10.1016/j.ijcip.2021.100433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System (ICS). SCADA systems have become an essential part of automated control and monitoring of Critical Infrastructures (CI). Modern SCADA sys-tems have evolved from standalone systems into sophisticated, complex, open systems connected to the Internet. This geographically distributed modern SCADA system is more vulnerable to threats and cyber attacks than traditional SCADA. Traditional SCADA systems were less exposed to Internet threats as they operated on isolated networks. Over the years, an increase in the number of cyber-attacks against the SCADA systems seeks security researchers' attention towards their security. In this review paper, we first review the SCADA system architectures and comparative analysis of proposed/implemented communica-tion protocols, followed by attacks on such systems to understand and highlight the evolving security needs for SCADA systems. A short investigation of the current state of intrusion detection techniques in SCADA systems is done, followed by a brief study of testbeds for SCADA systems. The cloud and Internet of things (IoT) based SCADA systems are studied by analyzing modern SCADA systems' architecture. In the end, the review paper highlights the critical research problems that need to be resolved to close the security gaps in SCADA systems. (c) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] SCADA SECURITY?
    Thilmany, Jean
    MECHANICAL ENGINEERING, 2012, 134 (06) : 26 - 31
  • [22] SCADA Security Issues and FPGA implementation of AES - A Review
    Singh, Amrik
    Prasad, Ajay
    Talwar, Yoginder
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 899 - 904
  • [23] Cyber Security in Smart Grid SCADA Automation Systems
    Tawde, Reshma
    Nivangune, Ashwin
    Sankhe, Manoj
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [24] HIGH SECURITY WITH LOW LATENCY IN LEGACY SCADA SYSTEMS
    Solomakhin, Rouslan
    Tsang, Patrick
    Smith, Sean
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 63 - +
  • [25] Security considerations in DNP3 SCADA systems
    Patel, SC
    Graham, JH
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2004, : 73 - 78
  • [26] Designing Secure SCADA Systems Using Security Patterns
    Fernandez, Eduardo B.
    Larrondo-Petrie, Maria M.
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 909 - 916
  • [27] A DISTRIBUTED REAL-TIME EVENT CORRELATION ARCHITECTURE FOR SCADA SECURITY
    Deng, Yi
    Shukla, Sandeep
    CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 81 - 93
  • [28] A Modbus Traffic Generator for Evaluating the Security of SCADA Systems
    Al-Dalky, Rami
    Abduljaleel, Omar
    Salah, Khaled
    Otrok, Hadi
    Al-Qutayri, Mahmoud
    2014 9TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), 2014, : 809 - 814
  • [29] SECURITY ISSUES OF SCADA SYSTEMS IN CLOUD COMPUTING ENVIRONMENT
    Alakbarov, R. G.
    Hashimov, M. A.
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, : 65 - 67
  • [30] Security Issues in SCADA based Industrial Control Systems
    Babu, Bijoy
    Ijyas, Thafasal
    Muneer, P.
    Varghese, Justin
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 47 - 51