Reference Hub1
Detecting Cyber Attacks on SCADA and Other Critical Infrastructures

Detecting Cyber Attacks on SCADA and Other Critical Infrastructures

Maurilio Pereira Coutinho, Germano Lambert-Torres, Luiz Eduardo Borges da Silva, Horst Lazarek, Elke Franz
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
DOI: 10.4018/978-1-4666-2659-1.ch002
Cite Chapter Cite Chapter

MLA

Coutinho, Maurilio Pereira, et al. "Detecting Cyber Attacks on SCADA and Other Critical Infrastructures." Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, et al., IGI Global, 2013, pp. 17-53. https://doi.org/10.4018/978-1-4666-2659-1.ch002

APA

Coutinho, M. P., Lambert-Torres, G., Borges da Silva, L. E., Lazarek, H., & Franz, E. (2013). Detecting Cyber Attacks on SCADA and Other Critical Infrastructures. In C. Laing, A. Badii, & P. Vickers (Eds.), Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (pp. 17-53). IGI Global. https://doi.org/10.4018/978-1-4666-2659-1.ch002

Chicago

Coutinho, Maurilio Pereira, et al. "Detecting Cyber Attacks on SCADA and Other Critical Infrastructures." In Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection, edited by Christopher Laing, Atta Badii, and Paul Vickers, 17-53. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2659-1.ch002

Export Reference

Mendeley
Favorite

Abstract

Nowadays, critical infrastructure plays a fundamental role in our modern society. Telecommunication and transportation services, water and electricity supply, and banking and financial services are examples of such infrastructures. They expose society to security threats. To safeguard against these threats, providers of critical infrastructure services also need to maintain the security objectives of their interdependent data networks. As an important part of the electric power system critical infrastructure, Supervisory Control and Data Acquisition (SCADA) systems require protection from a variety of threats, and their network infrastructures are potentially vulnerable to cyber attacks because security has not been part of their design. The diversity and lack of interoperability in the communication protocols also create obstacles for anyone attempting to establish secure communication. In order to improve the security of SCADA systems, anomaly detection can be used to identify corrupted values caused by malicious attacks and injection faults. The aim of this chapter is to present an alternative technique for implementing anomaly detection to monitor electric power electric systems. The problem is addressed here by the use of rough set theory.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.