• Skip to main content
  • Skip to primary sidebar

crackthe.net

SINCE 2010

  • Hacking
  • Security
    • Cloud Security
    • Network Security
    • OS Security
    • OT Security
    • SoC Security
    • Web Security
  • VPN
    • Filesharing
    • Streaming
  • Hosting
crackthe.net / Security / OT Security / Cybersecurity for Industrial Control Systems: A Survey

Cybersecurity for Industrial Control Systems: A Survey

Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC).

ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment facilities, power generation, heavy industries, and distribution systems. Though ICSs were kept isolated from the Internet for so long, significant achievable business benefits are driving a convergence between ICSs and the Internet as well as information technology (IT) environments, such as cloud computing. As a result, ICSs have been exposed to the attack vectors used in the majority of cyber-attacks. However, ICS devices are inherently much less secure against such advanced attack scenarios.

A compromise to ICS can lead to enormous physical damage and danger to human lives. In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments.

Then we discuss the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security. The work may help to address the challenges of securing industrial processes, particularly while migrating them to the cloud environments.

Link: https://arxiv.org/pdf/2002.04124.pdf

  • OT Security Certifications (GICSP, GRID, GCIP)
  • ATT&CK® for Industrial Control Systems (ICS)
  • Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities
  • Adversarial Attacks on Machine Learning Cybersecurity Defences in ICS
  • Architecture and Security of SCADA Systems: A Review
  • Assessing Cyber-Physical Security in Industrial Control Systems
  • Anomaly Detection for Industrial Control Networks using Machine Learning
  • An IT-Security Fuzzing Framework for Proprietary ICS Protocols
  • Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams
  • A Public Network Trace of a Control and Automation System

Primary Sidebar

posts

  • Best VPN Service Provider
  • Ethical Hacking Online Courses
  • IT Security Online Courses
  • CISSP Exam Preparation
  • CEH, LPT & OSCP Exam Preparation
  • Top Ethical Hacker Forums
  • Virtual Penetration Testing Labs
  • Managed WordPress Hosting
  • Best Public Torrent Sites
  • Best Filehoster
  • Seedbox Providers
  • WordPress Security
  • Premium Proxies (HTTP/S, SOCKS4/5)
  • Top 20 Network Security Tools

contact

If you have any questions, don’t hesitate to get in touch: mail [at] crackthe.net, XING or LinkedIn. You can also follow me on Twitter.
© 2010 - 2020 crackthe.net • Site Notice • Privacy Policy