Home > Published Issues > 2020 > Volume 9, No. 5, September 2020 >

Security Monitoring and Network Management for the Power Control Network

Sugwon Hong, Jae-Myeong Lee, Mustafa Altaha, and Muhammad Aslam
Department of Computer Engineering, Myongji University, Yongin, R. of Korea

Abstract—Security monitoring is a viable solution to enhance the security capability in the current power control Supervisory Control and Data Acquisition (SCADA) system, more broadly Industrial Control System (ICS), since the intrusion detection system as a main tool for monitoring can be easily deployed without any change of SCADA configuration. We explain how to design the SCADA domain-specific network security monitoring system, reflecting semantics of the target SCADA network. However, the attack vectors of the recent attacks to the SCADA/ICS systems are the vulnerabilities of the software underlying the host systems. In this respect, we need security monitoring running on host systems which can provide process and memory protection. Furthermore, network and system management (NMS), which incorporates the traditional network management into the power control system, can not only help to manage and maintain the IT/OT (information technology and operational technology) systems in a unified way, but also enhance the security capability of the SCADA system with collaboration with network and host security monitoring. 
 
Index Terms—Cyber security, IDS, network management, power control network, SCADA, security monitoring

Cite: Sugwon Hong, Jae-Myeong Lee, Mustafa Altaha, and Muhammad Aslam, "Security Monitoring and Network Management for the Power Control Network," International Journal of Electrical and Electronic Engineering & Telecommunications, Vol. 9, No. 5, pp. 356-363, September 2020. Doi: 10.18178/ijeetc.9.5.356-363

Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.