1,593
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Position Paper: Safety and Security Monitoring in ICS/SCADA Systems

      proceedings-article
      , ,
      2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014) (ICSCSR)
      ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
      11-12 September 2014
      ICS, SCADA, Critical Infrastructure, Security, Monitoring
      Bookmark

            Abstract

            Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, overseeing the monitoring and control of systems in electricity, gas supply, logistics services, banks and hospitals. Monitoring safety and security properties in industrial control system (ICS) and SCADA environments faces unique challenges not found in typical enterprise networks. Novel monitoring solutions are desirable that take into account these differences. This paper presents a new approach for monitoring safety and security properties in industrial control systems. The approach is based on verifying a formal specification of ICS/SCADA components during runtime that is capable of detecting abnormal system behaviours. The solution is miniaturised and can be deployed at various points throughout the SCADA network, making masquerading and man-in-the-middle attacks more difficult to execute successfully.

            Content

            Author and article information

            Contributors
            Conference
            September 2014
            September 2014
            : 61-66
            Affiliations
            [0001]Software Technology Research Laboratory

            De Montfort University, UK
            Article
            10.14236/ewic/ICSCSR2014.8
            2698e51b-4f69-4c0c-9468-8d2c956f35a0
            © Andrew Nicholson et al. Published by BCS Learning and Development Ltd. 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), St Pölten, Austria

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            ICSCSR
            2
            St Pölten, Austria
            11-12 September 2014
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICSCSR2014.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security,ICS,Critical Infrastructure,Monitoring,SCADA

            Comments

            Comment on this article