{"title":"Fuzzy-Decision Algorithms for Cyber Security Analysis of Advanced SCADA and Remote Monitoring Systems","authors":"S. Milić","doi":"10.4018/978-1-7998-2910-2.ch007","DOIUrl":null,"url":null,"abstract":"This chapter provides a complex data analysis of critical infrastructure SCADA vulnerabilities and exploits using fuzzy-decision algorithms. These algorithms are presented in two case studies describing possible scenarios of the cyber attack on two vital multi-parameter remote monitoring systems. The main objects of the cyber attack analysis are data obtained from their common SCADA system. The main focus is on multiparameter remote monitoring systems for monitoring electricity production and water traffic processes in the lock of hydropower plant. Newly developed fuzzy decision algorithms for comprehensive data analysis are presented to recognize the cyber attack. The results of the fuzzy modeling are directly dependent on the complex choice of the if-then rules on the basis of which decisions are made. In addition, two fuzzy logic systems (FLS-T1 and FLS-T2) are used for modeling several cyber attack scenarios.","PeriodicalId":254993,"journal":{"name":"Cyber Security of Industrial Control Systems in the Future Internet Environment","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security of Industrial Control Systems in the Future Internet Environment","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-2910-2.ch007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This chapter provides a complex data analysis of critical infrastructure SCADA vulnerabilities and exploits using fuzzy-decision algorithms. These algorithms are presented in two case studies describing possible scenarios of the cyber attack on two vital multi-parameter remote monitoring systems. The main objects of the cyber attack analysis are data obtained from their common SCADA system. The main focus is on multiparameter remote monitoring systems for monitoring electricity production and water traffic processes in the lock of hydropower plant. Newly developed fuzzy decision algorithms for comprehensive data analysis are presented to recognize the cyber attack. The results of the fuzzy modeling are directly dependent on the complex choice of the if-then rules on the basis of which decisions are made. In addition, two fuzzy logic systems (FLS-T1 and FLS-T2) are used for modeling several cyber attack scenarios.