Publication: Towards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Review
| dc.citedby | 6 | |
| dc.contributor.author | Qassim Q.S. | en_US |
| dc.contributor.author | Jamil N. | en_US |
| dc.contributor.author | Mahdi M.N. | en_US |
| dc.contributor.author | Abdul Rahim A.A. | en_US |
| dc.contributor.authorid | 36613541700 | en_US |
| dc.contributor.authorid | 36682671900 | en_US |
| dc.contributor.authorid | 56727803900 | en_US |
| dc.contributor.authorid | 57220806943 | en_US |
| dc.date.accessioned | 2023-05-29T08:07:58Z | |
| dc.date.available | 2023-05-29T08:07:58Z | |
| dc.date.issued | 2020 | |
| dc.description | Computer crime; Intrusion detection; Catastrophic consequences; Defence mechanisms; Detection methods; Intrusion Detection Systems; Malicious activities; Scada networks; Stealth attacks; Supervisory control and dataacquisition systems (SCADA); SCADA systems | en_US |
| dc.description.abstract | Securing and protecting Supervisory Control and Data Acquisition (SCADA) systems have been an active topic of research for the past decades due to the catastrophic and disastrous consequences when these systems are breached or compromised. Therefore, possible cyberattacks and malicious behaviours must be addressed instantly to prevent catastrophic and disastrous consequences on the national critical infrastructures. To this end, intrusion detection systems are considered as an essential security defence mechanism for SCADA networks. It can effectively detect potential cyberattacks and malicious activities and prevent catastrophic consequences. However, zero-day, deception and stealth attacks require a special type of detection methods in which it should be able to identify anomalies and detect possible malicious activities. There are a handful number of studies that have been carried out previously in this regard. However, this area of research is still immature and emerging. Therefore, this research is intended to investigate the merits, limitations and drawbacks of the existing detection methods, investigates the cyberattacks on SCADA systems, identify key features that can be used to discover irregular activities and to put forward the requirements and recommendations for detect cyberattacks and malicious activities in the SCADA networks. � 2020 IEEE. | en_US |
| dc.description.nature | Final | en_US |
| dc.identifier.ArtNo | 9243337 | |
| dc.identifier.doi | 10.1109/ICIMU49871.2020.9243337 | |
| dc.identifier.epage | 149 | |
| dc.identifier.scopus | 2-s2.0-85097655331 | |
| dc.identifier.spage | 144 | |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097655331&doi=10.1109%2fICIMU49871.2020.9243337&partnerID=40&md5=f89a24c5d9380e43f187d964092414cb | |
| dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/25296 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.source | Scopus | |
| dc.sourcetitle | 2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020 | |
| dc.title | Towards SCADA Threat Intelligence based on Intrusion Detection Systems - A Short Review | en_US |
| dc.type | Conference Paper | en_US |
| dspace.entity.type | Publication |