Title | Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Hossain, Md. Turab, Hossain, Md. Shohrab, Narman, Husnu S. |
Conference Name | 2020 11th IEEE Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON) |
Date Published | oct |
Keywords | compositionality, data mining, Human Behavior, human factors, Itemsets, logs, malicious actions, Monitoring, Power systems, process-related threats, pubcrawl, resilience, Resiliency, SCADA, SCADA System Security, SCADA systems, SCADA Systems Security, Servers, Substations, undesired events |
Abstract | A Supervisory Control and Data Acquisition (SCADA) system used in controlling or monitoring purpose in industrial process automation system is the process of collecting data from instruments and sensors located at remote sites and transmitting data at a central site. Most of the existing works on SCADA system focused on simulation-based study which cannot always mimic the real world situations. We propose a novel methodology that analyzes SCADA logs on offline basis and helps to detect process-related threats. This threat takes place when an attacker performs malicious actions after gaining user access. We conduct our experiments on a real-life SCADA system of a Power transmission utility. Our proposed methodology will automate the analysis of SCADA logs and systemically identify undesired events. Moreover, it will help to analyse process-related threats caused by user activity. Several test study suggest that our approach is powerful in detecting undesired events that might caused by possible malicious occurrence. |
DOI | 10.1109/UEMCON51285.2020.9298067 |
Citation Key | hossain_detection_2020 |