alexa Safeguarding Scada Network by Captious State Based Fil
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Safeguarding Scada Network by Captious State Based Filter

I.Karthika1, Mr. M. Mohamed Musthafa2
  1. II ME Computer science, Alameen Engineering College, Tamilnadu, India
  2. HOD, Dept. of CSE, Alameen Engineering College, Tamilnadu, India
Related article at Pubmed, Scholar Google
 

Abstract

SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). It’s a centralized system that monitors and control industrial processes that exist in the physical world. The system consists of centralized computer, communication device, Programmable logic controllers, sensors put together to monitor, control and process a system. This system is used to automate a complex process. They work in Master – Slave basis. This system is widely used in Power plants, traffic light control, power plants, etc., As it is a centralized system storing lot of data, there is chance for the attackers to hack the information. In the existing system, a special filtering system is used which acts as a firewall for the SCADA network. System is prevented from hackers by analyzing the state of the system. It involves the prediction of finding whether the system is close to the critical state. If it is so, the filtering system will block the packets. Only attack by the hacker is prevented. Any Software problem is not rectified. Proposed system identifies the intentional and unintentional software errors using ladder logic code.

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords