Cyber Security of Industrial Control Systems in the Future Internet Environment最新文献

筛选
英文 中文
Challenges in Securing Industrial Control Systems Using Future Internet Technologies 使用未来互联网技术保护工业控制系统的挑战
Cyber Security of Industrial Control Systems in the Future Internet Environment Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2910-2.ch001
M. Stojanović, Slavica V. Boštjančič Rakas
{"title":"Challenges in Securing Industrial Control Systems Using Future Internet Technologies","authors":"M. Stojanović, Slavica V. Boštjančič Rakas","doi":"10.4018/978-1-7998-2910-2.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-2910-2.ch001","url":null,"abstract":"This chapter explores challenges in securing industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems using Future Internet technologies. These technologies include cloud computing, fog computing, Industrial internet of things (IIoT), etc. The need to design specific security solutions for ICS/SCADA networks is explained. A brief overview of cyber vulnerabilities and threats in industrial control networks, cloud, and IoT environments is presented. The security of cloud-based SCADA systems is considered, including benefits and risks of SCADA migration to the cloud, challenges in securing such systems, and migration toward fog computing. Challenges in securing IIoT are addressed, including security risks and operational issues, key principles for securing IIoT, the functional security architecture, and the role of fog computing. Authors point out current standardization activities and trends in the area, and emphasize conclusions and future research directions.","PeriodicalId":254993,"journal":{"name":"Cyber Security of Industrial Control Systems in the Future Internet Environment","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131647851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems 高级SCADA和远程监控系统网络安全分析的模糊决策算法
Cyber Security of Industrial Control Systems in the Future Internet Environment Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2910-2.ch007
S. Milić
{"title":"Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems","authors":"S. Milić","doi":"10.4018/978-1-7998-2910-2.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-2910-2.ch007","url":null,"abstract":"This chapter provides a complex data analysis of critical infrastructure SCADA vulnerabilities and exploits using fuzzy-decision algorithms. These algorithms are presented in two case studies describing possible scenarios of the cyber attack on two vital multi-parameter remote monitoring systems. The main objects of the cyber attack analysis are data obtained from their common SCADA system. The main focus is on multiparameter remote monitoring systems for monitoring electricity production and water traffic processes in the lock of hydropower plant. Newly developed fuzzy decision algorithms for comprehensive data analysis are presented to recognize the cyber attack. The results of the fuzzy modeling are directly dependent on the complex choice of the if-then rules on the basis of which decisions are made. In addition, two fuzzy logic systems (FLS-T1 and FLS-T2) are used for modeling several cyber attack scenarios.","PeriodicalId":254993,"journal":{"name":"Cyber Security of Industrial Control Systems in the Future Internet Environment","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125966924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Compressive Compilation of Cyber Security for Internet of Energy (IoE) 面向能源互联网的网络安全压缩算法
Cyber Security of Industrial Control Systems in the Future Internet Environment Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2910-2.ch013
G. Arroyo-Figueroa, Isai Rojas-Gonzalez, J. A. Hernández-Aguilar
{"title":"A Compressive Compilation of Cyber Security for Internet of Energy (IoE)","authors":"G. Arroyo-Figueroa, Isai Rojas-Gonzalez, J. A. Hernández-Aguilar","doi":"10.4018/978-1-7998-2910-2.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-2910-2.ch013","url":null,"abstract":"Internet of energy (IoE) is the natural evolution of Smart Grid incorporating the paradigm of internet of things (IoT). This complicated environment has a lot of threats and vulnerabilities, so the security challenges are very complex and specialized. This chapter contains a compilation of the main threats, vulnerabilities, and attacks that can occur in the IoE environment and the critical structure of the electrical grid. The objective is to show the best cybersecurity practices that can support maintaining a safe, reliable, and available electrical network complying with the requirements of availability, integrity, and confidentially of the information. The study includes review of countermeasures, standards, and specialized intrusion detection systems, as mechanisms to solve security problems in IoE. Better understanding of security challenges and solutions in the IoE can be the light on future research work for IoE security.","PeriodicalId":254993,"journal":{"name":"Cyber Security of Industrial Control Systems in the Future Internet Environment","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信