Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification

View through CrossRef
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear power plants, etc. The growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of SCADA systems and CIs to various forms of security challenges. Any form of intrusive action on the SCADA modules and communication networks can create devastating consequences on nations due to their strategic importance to CIs’ operations. Therefore, the prompt and efficient detection and classification of SCADA systems intrusions hold great importance for national CIs operational stability. Due to their well-recognized and documented efficiencies, several literature works have proposed numerous supervised learning techniques for SCADA intrusion detection and classification (IDC). This paper presents a critical review of recent studies whereby supervised learning techniques were modelled for SCADA intrusion solutions. The paper aims to contribute to the state-of-the-art, recognize critical open issues and offer ideas for future studies. The intention is to provide a research-based resource for researchers working on industrial control systems security. The analysis and comparison of different supervised learning techniques for SCADA IDC systems were critically reviewed, in terms of the methodologies, datasets and testbeds used, feature engineering and optimization mechanisms and classification procedures. Finally, we briefly summarized some suggestions and recommendations for future research works.
Title: A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
Description:
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear power plants, etc.
The growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of SCADA systems and CIs to various forms of security challenges.
Any form of intrusive action on the SCADA modules and communication networks can create devastating consequences on nations due to their strategic importance to CIs’ operations.
Therefore, the prompt and efficient detection and classification of SCADA systems intrusions hold great importance for national CIs operational stability.
Due to their well-recognized and documented efficiencies, several literature works have proposed numerous supervised learning techniques for SCADA intrusion detection and classification (IDC).
This paper presents a critical review of recent studies whereby supervised learning techniques were modelled for SCADA intrusion solutions.
The paper aims to contribute to the state-of-the-art, recognize critical open issues and offer ideas for future studies.
The intention is to provide a research-based resource for researchers working on industrial control systems security.
The analysis and comparison of different supervised learning techniques for SCADA IDC systems were critically reviewed, in terms of the methodologies, datasets and testbeds used, feature engineering and optimization mechanisms and classification procedures.
Finally, we briefly summarized some suggestions and recommendations for future research works.

Related Results

Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
SCADA (Supervisory Control and Data Acquisition) systems play a pivotal role in managing critical industrial processes, extending from energy production to manufacturing. However, ...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
JARINGAN TELEKOMUNIKASI PADA SCADA MENGGUNAKAN CISCO PACKET TRACKER
JARINGAN TELEKOMUNIKASI PADA SCADA MENGGUNAKAN CISCO PACKET TRACKER
In Indonesia in particular, SCADA has been recognized and started to be implemented in electric power system control since the early 1980s. In other more developed countries, the a...
IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS
IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS
This paper focuses on improving the cybersecurity of Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in managing industrial and critical infras...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
CLASSIFYING THE SUPERVISED MACHINE LEARNING AND COMPARING THE PERFORMANCES OF THE ALGORITHMS
CLASSIFYING THE SUPERVISED MACHINE LEARNING AND COMPARING THE PERFORMANCES OF THE ALGORITHMS
Supervised Learning (SL), also recognized as SML, means Supervised Machine Learning. Its a subclass of AI (Artificial Intelligence) and Machine Learning (ML). Its defined by the co...
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Hybrid Cybersecurity for Asymmetric Threats: Intrusion Detection and SCADA System Protection Innovations
Supervisory control and data acquisition (SCADA) systems are vulnerable to cyberattacks; hence, cybersecurity is a major concern. Hybrid methodologies using advanced machine learni...

Back to Top