Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/259054
Title: An optimization framework for intrusion detection in SCADA system
Researcher: Shitharth S
Guide(s): Prince Winston D
Keywords: Engineering and Technology,Computer Science,Computer Science Information Systems
Framework
SCADA System
University: Anna University
Completed Date: 2018
Abstract: Supervisory Control and Data Acquisition (SCADA) is a dedicated network, which interconnects and provides better communication by using actuators and sensors. In recent days, an intrusion detection and classification is one of the most challenging tasks in SCADA network. In general, the SCADA systems are completely employed to resolve the necessity of monitoring the electric power generation, transmission and distribution, industrial-based applications, waste treating plants and water distribution systems. The entire SCADA network is monitored using Logic Controller (PLC) or a normal Personal Computer (PC) or a Human Machine Interface (HMI). The data gathered from a sensing field is transferred to the open network based on a significant gateway. The intrusions are capable of penetrating through internet by means of breaching the security constraint of the surviving protocols and are becoming a vital threat in collapsing the complete database. With respond to the enormous development of the cyber-physical systems, the intrusions are also growing substantially. It is typically responsible for causing degrading effects in the perfectly functioning system. Consequently, the whole web application is interrupted and the core motivation of the devised system is disturbed and deviated. Though there exist some peculiar firewall strategies that are prevalent in commercial networks, the security criterion is left unsatisfied. Unlike other networking applications prevailing at present, safeguarding the SCADA network is completely different. Contrasted with other communication networks, information that is transmitted through the SCADA network scores a vital place that comprises the practically sensed information. There are many kinds of intrusion identifying mechanisms available, to identify and mitigate intrusions that cause a devastating effect in the SCADA network. newline newline newline
Pagination: xix, 142p.
URI: http://hdl.handle.net/10603/259054
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File99.64 kBAdobe PDFView/Open
02_certificates.pdf494.12 kBAdobe PDFView/Open
03_abstract.pdf87.28 kBAdobe PDFView/Open
04_acknowledgement.pdf81.6 kBAdobe PDFView/Open
05_table of contents.pdf98.09 kBAdobe PDFView/Open
06_list_of_symbols and abbreviations.pdf272.91 kBAdobe PDFView/Open
07_chapter1.pdf568.33 kBAdobe PDFView/Open
08_chapter2.pdf563.41 kBAdobe PDFView/Open
09_chapter3.pdf983.34 kBAdobe PDFView/Open
10_chapter4.pdf997.63 kBAdobe PDFView/Open
11_chapter5.pdf698.95 kBAdobe PDFView/Open
12_conclusion.pdf168.89 kBAdobe PDFView/Open
13_references.pdf287.79 kBAdobe PDFView/Open
14_list_of_publications.pdf503.32 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: