Autonomic computing meets SCADA security

National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the autonomic nervous system and is promising to meet the latest challenges in the cyber threat landscape. This paper provides a brief review of autonomic computing applications for SCADA systems and proposes architecture for cyber security.

[1]  Thomas A. Corbi,et al.  The dawning of the autonomic computing era , 2003, IBM Syst. J..

[2]  Daniel Martins,et al.  A Hybrid Approach for Big Data Outlier Detection from Electric Power SCADA System , 2017, IEEE Latin America Transactions.

[3]  Yingxu Wang,et al.  Cognitive informatics models of the brain , 2006, IEEE Trans. Syst. Man Cybern. Syst..

[4]  B. S. Bindhumadhava,et al.  SCADA communication protocols: vulnerabilities, attacks and possible mitigations , 2013, CSI Transactions on ICT.

[5]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[6]  Igor Nai Fovino,et al.  A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.

[7]  Yingxu Wang,et al.  Cognitive informatics models of the brain , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[8]  Robin A. Gandhi,et al.  An integrated framework for control system simulation and regulatory compliance monitoring , 2011, Int. J. Crit. Infrastructure Prot..

[9]  Julie A. McCann,et al.  A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.

[10]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[11]  Shushma Patel,et al.  A layered reference model of the brain (LRMB) , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Sherif Abdelwahed,et al.  Towards realizing self-protecting SCADA systems , 2014, CISR '14.

[13]  Salim Hariri,et al.  Autonomic Computing: An Overview , 2004, UPP.

[14]  Pieter H. Hartel,et al.  A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.

[15]  Salim Hariri,et al.  The application of autonomic computing for the protection of industrial control systems , 2011 .

[16]  Nils Ole Tippenhauer,et al.  HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems , 2016, CPS-SPC '16.

[17]  M. Reiser,et al.  Security intelligence for industrial control systems , 2016, IBM J. Res. Dev..

[18]  Dong Wei,et al.  Survivable SCADA Via Intrusion-Tolerant Replication , 2014, IEEE Transactions on Smart Grid.

[19]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[20]  Lasith Yasakethu,et al.  Anomaly Detection via One Class SVM for Protection of SCADA Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[21]  Maninder Singh,et al.  The Journey of QoS-Aware Autonomic Cloud Computing , 2017, IT Professional.

[22]  Manuel Rodríguez-Martínez,et al.  Autonomic Computing Drives Innovation of Energy Smart Grids , 2012, Complex Adaptive Systems.

[23]  Matthew Roughan,et al.  Case Studies of SCADA Firewall Configurations and the Implications for Best Practices , 2016, IEEE Transactions on Network and Service Management.

[24]  Li Yang,et al.  A KNOWLEDGE EXPRESSION METHOD OF SCADA NETWORK ATTACK AND DEFENCE BASED ON FACTOR STATE SPACE , 2012 .