[HTML][HTML] A review of research works on supervised learning algorithms for SCADA intrusion detection and classification

OA Alimi, K Ouahada, AM Abu-Mahfouz, S Rimer… - Sustainability, 2021 - mdpi.com
Sustainability, 2021mdpi.com
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in
providing remote access, monitoring and control of critical infrastructures (CIs) which
includes electrical power systems, water distribution systems, nuclear power plants, etc. The
growing interconnectivity, standardization of communication protocols and remote
accessibility of modern SCADA systems have contributed massively to the exposure of
SCADA systems and CIs to various forms of security challenges. Any form of intrusive action …
Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear power plants, etc. The growing interconnectivity, standardization of communication protocols and remote accessibility of modern SCADA systems have contributed massively to the exposure of SCADA systems and CIs to various forms of security challenges. Any form of intrusive action on the SCADA modules and communication networks can create devastating consequences on nations due to their strategic importance to CIs’ operations. Therefore, the prompt and efficient detection and classification of SCADA systems intrusions hold great importance for national CIs operational stability. Due to their well-recognized and documented efficiencies, several literature works have proposed numerous supervised learning techniques for SCADA intrusion detection and classification (IDC). This paper presents a critical review of recent studies whereby supervised learning techniques were modelled for SCADA intrusion solutions. The paper aims to contribute to the state-of-the-art, recognize critical open issues and offer ideas for future studies. The intention is to provide a research-based resource for researchers working on industrial control systems security. The analysis and comparison of different supervised learning techniques for SCADA IDC systems were critically reviewed, in terms of the methodologies, datasets and testbeds used, feature engineering and optimization mechanisms and classification procedures. Finally, we briefly summarized some suggestions and recommendations for future research works.
MDPI
以上显示的是最相近的搜索结果。 查看全部搜索结果