Blog
About

156
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Position Paper: Safety and Security Monitoring in ICS/SCADA Systems

      , ,

      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)

      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)

      11-12 September 2014

      ICS, SCADA, Critical Infrastructure, Security, Monitoring

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, overseeing the monitoring and control of systems in electricity, gas supply, logistics services, banks and hospitals. Monitoring safety and security properties in industrial control system (ICS) and SCADA environments faces unique challenges not found in typical enterprise networks. Novel monitoring solutions are desirable that take into account these differences. This paper presents a new approach for monitoring safety and security properties in industrial control systems. The approach is based on verifying a formal specification of ICS/SCADA components during runtime that is capable of detecting abnormal system behaviours. The solution is miniaturised and can be deployed at various points throughout the SCADA network, making masquerading and man-in-the-middle attacks more difficult to execute successfully.

          Related collections

          Most cited references 2

          • Record: found
          • Abstract: not found
          • Article: not found

          SCADA security in the light of Cyber-Warfare

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Run-time analysis of time-critical systems

              Bookmark

              Author and article information

              Contributors
              Conference
              September 2014
              September 2014
              : 61-66
              Affiliations
              Software Technology Research Laboratory

              De Montfort University, UK
              Article
              10.14236/ewic/ICSCSR2014.8
              © Andrew Nicholson et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

              This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

              2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
              ICSCSR
              2
              St Pölten, Austria
              11-12 September 2014
              Electronic Workshops in Computing (eWiC)
              ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
              Product
              Product Information: 1477-9358BCS Learning & Development
              Self URI (journal page): https://ewic.bcs.org/
              Categories
              Electronic Workshops in Computing

              Comments

              Comment on this article