مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

764
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

AN ACCESS MANAGEMENT SYSTEM TO MITIGATE OPERATIONAL THREATS IN SCADA SYSTEM

Pages

  3-17

Abstract

 One of the most dangerous INSIDER THREATs in a supervisory control and data acquisition (SCADA) system is the operational threat. An operational threat occurs when an authorized operator misuses the permissions, and brings catastrophic damages by sending legitimate control commands. Providing too many permissions may backfire, when an operator wrongly or deliberately abuses the privileges. Therefore, an access management system is required to provide necessary permissions and prevent malicious usage. An operational threat on a critical infrastructure has the potential to cause large financial losses and irreparable damages at the national level. In this paper, we propose a new alarm-trust based access management system reducing the potential of operational threats in SCADA system. In the proposed system, the accessibility of a remote substation will be determined based on the operator TRUST and the criticality level of the substation. The TRUST value of the operator is calculated using the performance of the operator, periodically or in emergencies, when an anomaly is detected. The criticality level of the substation is computed using its properties. Our system is able to detect anomalies that may result from the operational threats. The simulation results in the SCADA power system of Iran show effectiveness of our system.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    MAHMOUDI NASR, PAYAM, & YAZDIAN VARJANI, ALI. (2018). AN ACCESS MANAGEMENT SYSTEM TO MITIGATE OPERATIONAL THREATS IN SCADA SYSTEM. SIGNAL AND DATA PROCESSING, 14(4 (SERIAL 34) ), 3-17. SID. https://sid.ir/paper/160836/en

    Vancouver: Copy

    MAHMOUDI NASR PAYAM, YAZDIAN VARJANI ALI. AN ACCESS MANAGEMENT SYSTEM TO MITIGATE OPERATIONAL THREATS IN SCADA SYSTEM. SIGNAL AND DATA PROCESSING[Internet]. 2018;14(4 (SERIAL 34) ):3-17. Available from: https://sid.ir/paper/160836/en

    IEEE: Copy

    PAYAM MAHMOUDI NASR, and ALI YAZDIAN VARJANI, “AN ACCESS MANAGEMENT SYSTEM TO MITIGATE OPERATIONAL THREATS IN SCADA SYSTEM,” SIGNAL AND DATA PROCESSING, vol. 14, no. 4 (SERIAL 34) , pp. 3–17, 2018, [Online]. Available: https://sid.ir/paper/160836/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button