Blog
About

222
views
0
recommends
+1 Recommend
1 collections
    12
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Towards a Distributed Runtime Monitor for ICS/SCADA Systems

      , , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      SCADA, ICS, cyber, security, idstributed, run-time, monitoring

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          IndustrialControl Systems (ICS) and SCADA (SupervisoryControl and Data Acquisition) systems are typically used in industries such as electricity generation and supply, gas supply, logistics, manufacturing and hospitals and are considered critical national infrastructure. The evolution of these systems from isolated environments into internet connected ones, in combination with their long service life and real-time nature have raised severe security concerns in the event of a cyber-attack. In this paper, we review the current literature surrounding the threats, vulnerabilities, exploits and existing approaches to securing vulnerable SCADA systems. We then focus specifically on the development of a distributed online runtime monitor to detect violations of safety properties.We conclude with suggestions for further research needed to progress the state of the art in the area of distributed online runtime verification of SCADA systems.

          Related collections

          Most cited references 45

          • Record: found
          • Abstract: not found
          • Article: not found

          A brief account of runtime verification

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            SCADA security in the light of Cyber-Warfare

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation

                Bookmark

                Author and article information

                Contributors
                Conference
                August 2016
                August 2016
                : 132-141
                Affiliations
                Department of Computer Science

                University of Leicester

                Leicester, UK
                Airbus Group Innovations

                Newport, UK
                Software Technology Research Laboratory

                De Montfort University

                Leicester, UK
                Article
                10.14236/ewic/ICS2016.15
                © Wain et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                4th International Symposium for ICS & SCADA Cyber Security Research 2016
                ICS-CSR
                4
                Queen’s Belfast University, UK
                23 - 25 August 2016
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article