chapter  9
22 Pages

Intrusion Detection for SCADA Systems

Supervisory control and data acquisition (SCADA) systems are used in industrial systems that run automated processes to perform various industrial tasks. SCADA manages and controls a variety of systems, including cooling, ventilation, and power distribution and generation in addition to sensitive processes such as nuclear fusion. Statistics show that roughly 80% of the power facilities in the United States are controlled by SCADA systems [1]. A SCADA system allows for convergence and interconnectivity among many networks and nodes through many types of protocols, including the Internet protocol (IP) [2]. This wide scope makes the system vulnerable to widely known attacks in addition to the vulnerabilities in SCADA systems themselves.