𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention (Wiley Series on Parallel and Distributed Computing)

✍ Scribed by Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Xun Yi


Publisher
Wiley
Year
2020
Tongue
English
Leaves
212
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems

Cyber-attacks on SCADA systemsΒ—the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory managementΒ—can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning.

Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book:

  • Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems
  • Describes the relationship between main components and three generations of SCADA systems
  • Explains the classification of a SCADA IDS based on its architecture and implementation
  • Surveys the current literature in the field and suggests possible directions for future research

SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.


πŸ“œ SIMILAR VOLUMES


SCADA Security: Machine Learning Concept
✍ Abdulmohsen Almalawi; Zahir Tari; Adil Fahad; Xun Yi πŸ“‚ Library πŸ“… 2020 πŸ› John Wiley & Sons 🌐 English

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process

SCADA Security: Machine Learning Concept
✍ Abdulmohsen Almalawi; Zahir Tari; Adil Fahad; Xun Yi πŸ“‚ Library πŸ“… 2021 πŸ› Wiley 🌐 English

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systemsβ€”the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process

Advanced Computational Infrastructures f
✍ Manish Parashar, Xiaolin Li, Sumir Chandra πŸ“‚ Library πŸ“… 2009 πŸ› Wiley-Interscience 🌐 English

<b>A unique investigation of the state of the art in design, architectures, and implementations of advanced computational infrastructures and the applications they support <p> Emerging large-scale adaptive scientific and engineering applications are requiring an increasing amount of computing

Advanced Computational Infrastructures f
✍ Manish Parashar, Xiaolin Li, Sumir Chandra πŸ“‚ Library πŸ“… 2009 πŸ› Wiley-Interscience 🌐 English

<p>A unique investigation of the state of the art in design, architectures, and implementations of advanced computational infrastructures and the applications they support</p> <p>Emerging large-scale adaptive scientific and engineering applications are requiring an increasing amount of computing

Algorithms and Parallel Computing (Wiley
✍ Fayez Gebali πŸ“‚ Library πŸ“… 2011 πŸ› Wiley 🌐 English

There is a software gap between the hardware potential and the performance that can be attained using today's software parallel program development tools. The tools need manual intervention by the programmer to parallelize the code. Programming a parallel computer requires closely studying the targe

Abbas, A: Fog Computing (Wiley Series on
✍ Assad Abbas (editor), Samee U. Khan (editor), Albert Y. Zomaya (editor) πŸ“‚ Library πŸ“… 2020 πŸ› Wiley-Blackwell 🌐 English

Summarizes the current state and upcoming trends within the area of fog computing Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industri