Author(s):
Journal
Institute of Electrical and Electronics Engineers (IEEE)
Abstract
To address cybersecurity vulnerabilities in control systems, this paper proposes a supervisory control and data acquisition (SCADA) security framework that includes real-time monitoring, anomaly detection, impact analysis, and mitigation strategies, alongside an attack-tree-based methodology to evaluate system vulnerabilities.
Concluding remarks
Cybersecurity for critical infrastructures requires further research, particularly in areas like real-time correlation and intrusion detection algorithms, risk monitoring, and advanced modeling techniques that account for dynamic attacker behavior and system impacts. The proposed RAIM framework and attack-tree methodology offer a structured approach to evaluating system vulnerabilities, but further development, including test-bed validation and visualization techniques, is necessary for practical application.
Reference details
DOI
10.1109/TSMCA.2010.2048028
Resource type
Journal Article
Year of Publication
2010
ISSN Number
1083-4427
Publication Area
Civilian cybersecurity
Date Published
2010-07
How to cite this reference:
Ten, C.-W., Manimaran, G., & Liu, C.-C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/TSMCA.2010.2048028 (Original work published)