Loading...
Please wait, while we are loading the content...
Similar Documents
Intrusion detection and cyber security monitoring of scada and dcs networks.
| Content Provider | CiteSeerX |
|---|---|
| Author | Peterson, Dale |
| Abstract | Governments and industry organizations, including ISA, have recognized that Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and other process control networks, referred to as SCADA networks in this paper, are potential targets of attack from hackers, disgruntled insiders, cyber terrorists, and others who want to disrupt the critical infrastructure. This paper describes how current intrusion detection and cyber security monitoring products and services used in IT enterprise networks can provide early identification of attacks from the most common threat agents. The deficiencies of the current general IT solutions are discussed, and future SCADA specific solutions are described. Special emphasis is placed on how intrusion detection can serve as a compensating security control for the lack of security in field communications. In a recent GAO report 1, the US Government identified five trends that have escalated the risks to SCADA networks: 1. adoption of standardized technologies with known vulnerabilities, 2. connectivity of control systems to other networks, |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Supervisory Control Special Emphasis Potential Target Standardized Technology Compensating Security Control Critical Infrastructure Known Vulnerability Enterprise Network Distributed Control System Cyber Terrorist Intrusion Detection Current General Solution Field Communication Cyber Security Monitoring Product Future Scada Specific Solution Control System Process Control Network Data Acquisition Cyber Security Monitoring Scada Network Industry Organization Dc Network Common Threat Agent Current Intrusion Detection Early Identification U Government Recent Gao Report |
| Content Type | Text |
| Resource Type | Article |