Abstract
SCADA systems have historically been isolated from other computing resources. However, the use of TCP/IP as a carrier protocol and the trend to interconnect SCADA systems with enterprise networks introduce serious security threats. This paper describes two strategies for securing SCADA networks, both of which have been implemented in a laboratory-scale Modbus network. The first utilizes a security services suite that minimizes the impact on time-critical industrial process systems while adhering to industry standards. The second engages a sophisticated forensic system for SCADA network traffic collection and analysis. The forensic system supports the post mortem analysis of security breaches and the monitoring of process behavior to optimize plant performance. © 2008 International Federation for Information Processin.
Author supplied keywords
Cite
CITATION STYLE
Chandia, R., Gonzalez, J., Kilpatrick, T., Papa, M., & Shenoi, S. (2007). Security strategies for SCADA networks. In IFIP International Federation for Information Processing (Vol. 253, pp. 117–131). https://doi.org/10.1007/978-0-387-75462-8_9
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.