Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS

View through CrossRef
This paper focuses on improving the cybersecurity of Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in managing industrial and critical infrastructure processes. Due to increasing connectivity and the integration of legacy systems with modern networks, SCADA systems have become attractive targets for cyberattacks, particularly Denial of Service (DoS) attacks. The study analyzes common cybersecurity measures used to protect SCADA systems, including network segmentation, firewalls, strong authentication mechanisms, intrusion detection and prevention systems (IDS/IPS), and secure communication protocols. Special attention is given to the operational principles and impacts of DoS attacks on SCADA environments. A simulation-based approach is employed to demonstrate a DoS attack against a SCADA system deployed in a virtual environment. Network traffic analysis is performed using the Wireshark tool to detect abnormal packet flows, while the Snort IDS/IPS is configured to identify and block malicious traffic in real time. The results show that the implemented IDS/IPS mechanisms effectively detect, mitigate, and prevent DoS attacks, significantly reducing their impact on system availability and resource consumption. The findings highlight the importance of layered security approaches and real-time monitoring tools in enhancing the resilience of SCADA systems against cyber threats. Keywords: SCADA systems, cybersecurity, Denial of Service (DoS), IDS/IPS, Wireshark, Snort, network security, critical infrastructure.
Title: IMPROVING THE CYBERSECURITY OF SCADA SYSTEMS
Description:
This paper focuses on improving the cybersecurity of Supervisory Control and Data Acquisition (SCADA) systems, which play a critical role in managing industrial and critical infrastructure processes.
Due to increasing connectivity and the integration of legacy systems with modern networks, SCADA systems have become attractive targets for cyberattacks, particularly Denial of Service (DoS) attacks.
The study analyzes common cybersecurity measures used to protect SCADA systems, including network segmentation, firewalls, strong authentication mechanisms, intrusion detection and prevention systems (IDS/IPS), and secure communication protocols.
Special attention is given to the operational principles and impacts of DoS attacks on SCADA environments.
A simulation-based approach is employed to demonstrate a DoS attack against a SCADA system deployed in a virtual environment.
Network traffic analysis is performed using the Wireshark tool to detect abnormal packet flows, while the Snort IDS/IPS is configured to identify and block malicious traffic in real time.
The results show that the implemented IDS/IPS mechanisms effectively detect, mitigate, and prevent DoS attacks, significantly reducing their impact on system availability and resource consumption.
The findings highlight the importance of layered security approaches and real-time monitoring tools in enhancing the resilience of SCADA systems against cyber threats.
Keywords: SCADA systems, cybersecurity, Denial of Service (DoS), IDS/IPS, Wireshark, Snort, network security, critical infrastructure.

Related Results

Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes...
JARINGAN TELEKOMUNIKASI PADA SCADA MENGGUNAKAN CISCO PACKET TRACKER
JARINGAN TELEKOMUNIKASI PADA SCADA MENGGUNAKAN CISCO PACKET TRACKER
In Indonesia in particular, SCADA has been recognized and started to be implemented in electric power system control since the early 1980s. In other more developed countries, the a...
Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
Covert Penetrations: Analyzing and Defending SCADA Systems from Stealth and Hijacking Attacks
SCADA (Supervisory Control and Data Acquisition) systems play a pivotal role in managing critical industrial processes, extending from energy production to manufacturing. However, ...
IMPLEMENTING INTERNET PROTOCOL (IP) BASED SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORK SYSTEM
IMPLEMENTING INTERNET PROTOCOL (IP) BASED SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORK SYSTEM
SCADA (supervisory control and data acquisition) is a system that monitors and control industrial, infrastructure, or facility- based processes. Scada systems integrate data acquis...
THE CYBERSECURITY BLUEPRINT FOR FINANCE
THE CYBERSECURITY BLUEPRINT FOR FINANCE
In today’s increasingly digitized world, financial institutions face an unprecedented level of cyber threats that can compromise critical infrastructure and disrupt the global econ...

Back to Top