DEVELOPMENT AND INTEGRATION OF SIEM SOFTWARE SOLUTION INTO SCADA SYSTEMS
DOI:
https://doi.org/10.24867/13BE30TosicKeywords:
Critical infrastructures, SCADA, SIEM, DdoS, cyber attacksAbstract
The paper describes cyber threats to the security of critical infrastructures with an emphasis on SCADA systems. In addition to the theoretical foundations of the work, an application containing a SIEM software solution has been implemented.
References
[1] W. T. Shaw, „Cybersecurity for SCADA Systems“, 2008.
[2] Siddharth Sridhar, G. Manimaran, “Data Integrity Attacks and their Impacts on SCADA Control System”, Department of Electrical and Computer Engineering Iowa State University, 2010.
[3] Siddharth Sridhar, G. Manimaran, „Data Integrity Attacks and their Impacts on SCADA Control System“, Department of Electrical and Computer Engineering Iowa State University
[4] T. Paukatong, „SCADA Security: A New Concerning Issue of an In-house EGAT-SCADA“, IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China, 2005.
[5] Douligeris, Christos, and Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art." Computer Networks, 2004.
[6] Kim Zetter "Everything We Know About Ukraine's Power Plant Hack“. Wired, 2016.
[7] Anumol, E. T. "Use of machine learning algorithms with SIEM for attack prediction." Intelligent Computing, Communication and Devices. Springer, New Delhi, 2015.
[2] Siddharth Sridhar, G. Manimaran, “Data Integrity Attacks and their Impacts on SCADA Control System”, Department of Electrical and Computer Engineering Iowa State University, 2010.
[3] Siddharth Sridhar, G. Manimaran, „Data Integrity Attacks and their Impacts on SCADA Control System“, Department of Electrical and Computer Engineering Iowa State University
[4] T. Paukatong, „SCADA Security: A New Concerning Issue of an In-house EGAT-SCADA“, IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China, 2005.
[5] Douligeris, Christos, and Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art." Computer Networks, 2004.
[6] Kim Zetter "Everything We Know About Ukraine's Power Plant Hack“. Wired, 2016.
[7] Anumol, E. T. "Use of machine learning algorithms with SIEM for attack prediction." Intelligent Computing, Communication and Devices. Springer, New Delhi, 2015.
Downloads
Published
2021-07-04
Issue
Section
Electrotechnical and Computer Engineering