The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - October (2013 vol.46)
pp: 74-83
Cristina Alcaraz , University of Malaga, Spain
Sherali Zeadally , University of Kentucky
ABSTRACT
Critical control systems manage many of today's critical infrastructures, whose continuous operation, maintenance, and protection are high national priorities for governments around the world. The authors present the fundamental architectural components of these systems, identify vulnerabilities and potential threats, and describe protection solutions that can be deployed to mitigate attacks.
INDEX TERMS
Computer crime, Protocols, SCADA systems, Malware, Control systems,security, supervisory control and data acquisition systems, critical infrastructures, information and communication technologies
CITATION
Cristina Alcaraz, Sherali Zeadally, "Critical Control System Protection in the 21st Century", Computer, vol.46, no. 10, pp. 74-83, October 2013, doi:10.1109/MC.2013.69
REFERENCES
1. E. Knapp, Industrial Network Security, Securing Critical Infrastructure Networks for Smart Grid SCADA, and Other Industrial Control Systems, Syngress, 2011.
2. C. Alcaraz, “Interconnected Sensor Networks for Critical Information Infrastructure Protection,” doctoral dissertation, Computer Science Dept., University of Malaga, 2011.
3. D. Sanger and E. Schmitt, “Rise Is Seen in Cyberattacks Targeting US Infrastructure,” The New York Times,26 July 2012; www.nytimes.com/2012/07/27/uscyberattacks-are-up-national-security-chief-says.html?ref=global-home .
4. B. Miller and B. Young, “A Survey of SCADA and Critical Infrastructure Incidents,” Proc. Conf. Information Technology Education, ACM, 2012, pp. 51-56.
5. US Dept. Homeland Security, ICS-CERT, Incident Response Summary Report, 2009-2011, 2011; http://ics-cert.us-cert.govICS-CERT-Incident-Response-Summary-2009-2011 .
6. B. Zhu, A. Joseph, and S. Sastry, “A Taxonomy of Cyberattacks on SCADA Systems,” Proc. Int’l Conf. Cyber, Physical, and Social Computing, IEEE CS, 2011, pp. 380-388.
7. K. Stouffer, J. Falco, and K. Scarfone, Guide to Industrial Control Systems (ICS) Security, NIST Special Publication 800-82, Nat’l Inst. Standards and Technology, 2011.
8. I. Nai, A. Coletta, and M. Masera, Taxonomy of Security Solutions for the SCADA Sector, deliverable D22, v1.1, ESCORTS European Project, 2010.
9. O. Vukovic et al., “Network-layer Protection Schemes against Stealth Attacks on State Estimators in Power Systems,” Proc. IEEE Smart Grid Comm., IEEE, 2011, pp. 184-189.
10. C. Alcaraz et al., “Managing Incidents in Smart Grids à la Cloud,” Proc. IEEE Cloud Computing Technology and Science (CloudCom), IEEE, 2011, pp. 527-531.
11. US Dept. of Homeland Security, Catalog of Control Systems Security: Recommendations for Standards Developers, 2011; http://ics-cert.us-cert.gov/sites/default/ filesCatalogofRecommendationsVer7.pdf .
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool