Exposing to Infiltrate SCADA Using Whale Algorithm and Support Carrier

Abstract

In today's growing cyber attack, where the critical infrastructure of a country's communications and services can quickly be eliminated by hostile attacks, the protection of vital infrastructure and advanced cyber security is needed at all times. In fact, security defects for such systems can lead to widespread destruction and consequences in different layers of society. The SCADA system (information control and collection control system (process control system is computer -based. It monitors and interacts with the physical process of the remote road. This system collects information about the physical process conditions; the system is widely used in large industries such as petrochemicals, water distribution and nuclear power plants. Monitoring the proper performance of the process is provided on large control panels that allow the operator to allow the operator. With the introduction of telemetry, the conditions for connecting the equipment used in this infrastructure are created. In fact, the term SCADA refers to a technology that creates conditions for controlling and monitoring such infrastructures from a central control room. For example, this technology can be used in water distribution facilities to check the water level in the water storage tank, as well as monitor the flow and pressure in the pipe. The SCADA system enables the intelligent collection of information from various parts for the user and provides real-time monitoring of all processes, and may also warn in the event of an error and the operator can react by sending commands to work equipment compared to process changes.

Country : Iraq

1 Jenan Jader Msad2 Dhulfikar Dhurgham Husam3 Mustafa Husham Abbas

  1. Department of Computer Science, University of Al-Furat Al-Awsat, Najaf, Iraq
  2. Department of Computer Science, University of Al-Furat Al-Awsat, Najaf, Iraq
  3. Department of Computer Science, University of Al-Furat Al-Awsat, Najaf, Iraq

IRJIET, Volume 8, Issue 12, December 2024 pp. 20-23

doi.org/10.47001/IRJIET/2024.812003

References

  1. Nguyen, D. D., Le, M. T., & Cung, T. L. (2024). Improving intrusion detection in SCADA systems using stacking ensemble of tree-based models. Bulletin of Electrical Engineering and Informatics, 11(1), 119-127.
  2. Alimi, O. A., Ouahada, K., Abu-Mahfouz, A. M., Rimer, S., & Alimi, K. O. A. (2022, April). Supervised learning based intrusion detection for SCADA systems. In 2024 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON) (pp. 1-5). IEEE.
  3. Alshadoodee, H. A. A., Mansoor, M. S., Kuba, H. K., & Gheni, H. M. (2024). The role of artificial intelligence in enhancing administrative decision support systems by depends on knowledge management. Bulletin of Electrical Engineering and Informatics, 11(5).‏
  4. Sheng, C., Yao, Y., Fu, Q., & Yang, W. (2021). A cyber-physical model for SCADA system and its intrusion detection. Computer Networks, 185, 107677.‏
  5. Altaha, M., Lee, J. M., Aslam, M., & Hong, S. (2021). An Autoencoder-Based Network Intrusion Detection System for the SCADA System. J. Commun., 16(6), 210-216.‏
  6. Alimi, O. A., Ouahada, K., Abu-Mahfouz, A. M., Rimer, S., & Alimi, K. O. A. (2021). A review of research works on supervised learning algorithms for SCADA intrusion detection and classification. Sustainability, 13(17), 95-97.
  7. Rakas, S. V. B., Stojanović, M. D., & Marković-Petrović, J. D. (2020). A review of research work on network-based scada intrusion detection systems. IEEE Access, 8, 93083-93108.‏
  8. Khan, I. A., Pi, D., Khan, Z. U., Hussain, Y., & Nawaz, A. (2019). HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access, 7, 89507-89521.‏
  9. Abou El-Ela, A. A., El-Sehiemy, R. A., & El-Shebiny, A. M. (2019). Review of SCADA System for Distribution Power System Automation. ERJ. Engineering Research Journal, 42(2), 93-98.‏
  10. Sheng, C., Yao, Y., Fu, Q., & Yang, W. (2021). A cyber-physical model for SCADA system and its intrusion detection. Computer Networks, 185, 107677.‏
  11. Ujvarosi, A. (2016). Evolution of SCADA systems. Bulletin of the Transilvania University of Brasov. Engineering Sciences. Series I, 9(1), 63.
  12. Sazid, M. M., Nuhel, A. K., Shakib, M. A. A., Parvez, N., & Billah, M. (2022, April). Developing a Low-cost SCADA System for Industrial Application. In 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 227-232). IEEE.‏
  13. Gao, J., Gan, L., Buschendorf, F., Zhang, L., Liu, H., Li, P., ... & Lu, T. (2020). Omni SCADA intrusion detection using deep learning algorithms. IEEE Internet of Things Journal, 8(2), 951-961.‏
  14. Upadhyay, D., Manero, J., Zaman, M., & Sampalli, S. (2021). Intrusion detection in SCADA based power grids: Recursive feature elimination model with majority vote ensemble algorithm. IEEE Transactions on Network Science and Engineering, 8(3), 2559-2574.