
<ns0:uwmetadata xmlns:ns0="http://phaidra.univie.ac.at/XML/metadata/V1.0" xmlns:ns1="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0" xmlns:ns10="http://phaidra.univie.ac.at/XML/metadata/provenience/V1.0" xmlns:ns11="http://phaidra.univie.ac.at/XML/metadata/provenience/V1.0/entity" xmlns:ns12="http://phaidra.univie.ac.at/XML/metadata/digitalbook/V1.0" xmlns:ns13="http://phaidra.univie.ac.at/XML/metadata/etheses/V1.0" xmlns:ns2="http://phaidra.univie.ac.at/XML/metadata/extended/V1.0" xmlns:ns3="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/entity" xmlns:ns4="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/requirement" xmlns:ns5="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/educational" xmlns:ns6="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/annotation" xmlns:ns7="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/classification" xmlns:ns8="http://phaidra.univie.ac.at/XML/metadata/lom/V1.0/organization" xmlns:ns9="http://phaidra.univie.ac.at/XML/metadata/histkult/V1.0">
  <ns1:general>
    <ns1:identifier>o:28324</ns1:identifier>
    <ns1:title language="en">A review of research work on network-based SCADA intrusion detection systems</ns1:title>
    <ns1:language>en</ns1:language>
    <ns1:description language="en">Abstract: Specific intrusion detection systems (IDSs) are needed to secure modern supervisory control
and data acquisition (SCADA) systems due to their architecture, stringent real-time requirements, network
traffic features and specific application layer protocols. This article aims to contribute to assess the state-ofthe-art, identify the open issues and provide an insight for future study areas. To achieve these objectives,
we start from the factors that impact the design of dedicated intrusion detection systems in SCADA
networks and focus on network-based IDS solutions. We propose a structured evaluation methodology that
encompasses detection techniques, protected protocols, implementation tools, test environments and IDS
performance. Special attention is focused on assessing implementation maturity as well as the applicability
of each surveyed solution in the Future Internet environment. Based on that, we provide a brief description
and evaluation of 26 selected research papers, published in the period 2015–2019. Results of our analysis
indicate considerable progress regarding the development of machine learning-based detection methods,
implementation platforms, and to some extent, sophisticated testbeds. We also identify research gaps and
conclude the analysis with a list of the most important directions for further research.
</ns1:description>
    <ns1:keyword language="en">Anomaly-based detection, network security, SCADA, signature-based detection, specification-based detection</ns1:keyword>
    <ns2:identifiers>
      <ns2:resource>1552099</ns2:resource>
      <ns2:identifier>10.1109/ACCESS.2020.2994961</ns2:identifier>
    </ns2:identifiers>
    <ns2:identifiers>
      <ns2:resource>1552101</ns2:resource>
      <ns2:identifier>2169-3536</ns2:identifier>
    </ns2:identifiers>
  </ns1:general>
  <ns1:lifecycle>
    <ns1:upload_date>2023-03-21T12:59:48.882Z</ns1:upload_date>
    <ns1:status>44</ns1:status>
    <ns2:peer_reviewed>yes</ns2:peer_reviewed>
    <ns1:contribute seq="0">
      <ns1:role>46</ns1:role>
      <ns1:entity seq="0">
        <ns3:firstname>Slavica </ns3:firstname>
        <ns3:lastname>Boštjančič Rakas</ns3:lastname>
        <ns3:institution>Institut &quot;Mihajlo Pupin&quot;</ns3:institution>
        <ns3:orcid>0000-0002-0551-3070</ns3:orcid>
      </ns1:entity>
      <ns1:entity seq="1">
        <ns3:firstname>Mirjana</ns3:firstname>
        <ns3:lastname>Stojanović</ns3:lastname>
        <ns3:institution>Saobraćajni fakultet Univerziteta u Beogradu </ns3:institution>
        <ns3:type>person</ns3:type>
        <ns3:orcid>0000-0003-1073-5804</ns3:orcid>
      </ns1:entity>
      <ns1:entity seq="2">
        <ns3:firstname>Jasna </ns3:firstname>
        <ns3:lastname>Marković-Petrović</ns3:lastname>
        <ns3:institution>Hidroelektrana Đerdap</ns3:institution>
        <ns3:type>person</ns3:type>
      </ns1:entity>
    </ns1:contribute>
  </ns1:lifecycle>
  <ns1:technical>
    <ns1:format>application/pdf</ns1:format>
    <ns1:size>7376664</ns1:size>
    <ns1:location>https://phaidrabg.bg.ac.rs/o:28324</ns1:location>
  </ns1:technical>
  <ns1:rights>
    <ns1:cost>no</ns1:cost>
    <ns1:copyright>yes</ns1:copyright>
    <ns1:license>16</ns1:license>
  </ns1:rights>
  <ns1:classification>
    <ns1:purpose>70</ns1:purpose>
  </ns1:classification>
  <ns1:organization>
    <ns8:hoschtyp>92000001</ns8:hoschtyp>
    <ns8:orgassignment>
      <ns8:faculty>11A20</ns8:faculty>
    </ns8:orgassignment>
  </ns1:organization>
  <ns12:digitalbook>
    <ns12:name_magazine language="en">IEEE Access</ns12:name_magazine>
    <ns12:volume>8</ns12:volume>
    <ns12:releaseyear>2020</ns12:releaseyear>
  </ns12:digitalbook>
</ns0:uwmetadata>
