Publication:
Towards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Review

dc.citedby6
dc.contributor.authorQassim Q.S.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorMahdi M.N.en_US
dc.contributor.authorAbdul Rahim A.A.en_US
dc.contributor.authorid36613541700en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid56727803900en_US
dc.contributor.authorid57220806943en_US
dc.date.accessioned2023-05-29T08:07:58Z
dc.date.available2023-05-29T08:07:58Z
dc.date.issued2020
dc.descriptionComputer crime; Intrusion detection; Catastrophic consequences; Defence mechanisms; Detection methods; Intrusion Detection Systems; Malicious activities; Scada networks; Stealth attacks; Supervisory control and dataacquisition systems (SCADA); SCADA systemsen_US
dc.description.abstractSecuring and protecting Supervisory Control and Data Acquisition (SCADA) systems have been an active topic of research for the past decades due to the catastrophic and disastrous consequences when these systems are breached or compromised. Therefore, possible cyberattacks and malicious behaviours must be addressed instantly to prevent catastrophic and disastrous consequences on the national critical infrastructures. To this end, intrusion detection systems are considered as an essential security defence mechanism for SCADA networks. It can effectively detect potential cyberattacks and malicious activities and prevent catastrophic consequences. However, zero-day, deception and stealth attacks require a special type of detection methods in which it should be able to identify anomalies and detect possible malicious activities. There are a handful number of studies that have been carried out previously in this regard. However, this area of research is still immature and emerging. Therefore, this research is intended to investigate the merits, limitations and drawbacks of the existing detection methods, investigates the cyberattacks on SCADA systems, identify key features that can be used to discover irregular activities and to put forward the requirements and recommendations for detect cyberattacks and malicious activities in the SCADA networks. � 2020 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo9243337
dc.identifier.doi10.1109/ICIMU49871.2020.9243337
dc.identifier.epage149
dc.identifier.scopus2-s2.0-85097655331
dc.identifier.spage144
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85097655331&doi=10.1109%2fICIMU49871.2020.9243337&partnerID=40&md5=f89a24c5d9380e43f187d964092414cb
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/25296
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitle2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020
dc.titleTowards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Reviewen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections