ABSTRACT

Supervisory control and data acquisition (SCADA) systems are used in industrial systems that run automated processes to perform various industrial tasks. SCADA manages and controls a variety of systems, including cooling, ventilation, and power distribution and generation in addition to sensitive processes such as nuclear fusion. Statistics show that roughly 80% of the power facilities in the United States are controlled by SCADA systems [1]. A SCADA system allows for convergence and interconnectivity among many networks and nodes through many types of protocols, including the Internet protocol (IP) [2]. This wide scope makes the system vulnerable to widely known attacks in addition to the vulnerabilities in SCADA systems themselves.