Visible to the public Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring

TitleDetection of Undesired Events on Real-World SCADA Power System through Process Monitoring
Publication TypeConference Paper
Year of Publication2020
AuthorsHossain, Md. Turab, Hossain, Md. Shohrab, Narman, Husnu S.
Conference Name2020 11th IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON)
Date Publishedoct
Keywordscompositionality, data mining, Human Behavior, human factors, Itemsets, logs, malicious actions, Monitoring, Power systems, process-related threats, pubcrawl, resilience, Resiliency, SCADA, SCADA System Security, SCADA systems, SCADA Systems Security, Servers, Substations, undesired events
AbstractA Supervisory Control and Data Acquisition (SCADA) system used in controlling or monitoring purpose in industrial process automation system is the process of collecting data from instruments and sensors located at remote sites and transmitting data at a central site. Most of the existing works on SCADA system focused on simulation-based study which cannot always mimic the real world situations. We propose a novel methodology that analyzes SCADA logs on offline basis and helps to detect process-related threats. This threat takes place when an attacker performs malicious actions after gaining user access. We conduct our experiments on a real-life SCADA system of a Power transmission utility. Our proposed methodology will automate the analysis of SCADA logs and systemically identify undesired events. Moreover, it will help to analyse process-related threats caused by user activity. Several test study suggest that our approach is powerful in detecting undesired events that might caused by possible malicious occurrence.
DOI10.1109/UEMCON51285.2020.9298067
Citation Keyhossain_detection_2020