Component modeling for SCADA network mapping
Akande, Ayodeji J., Fidge, Colin, & Foo, Ernest (2015) Component modeling for SCADA network mapping. In Parry, David (Ed.) Proceedings of the 38th Australasian Computer Science Conference (ACSC 2015), Conferences in Research and Practice in Information Technology (CRPIT), Sydney, NSW, pp. 91-100.
Supervisory Control and Data Acquisition systems (SCADA) are widely used to control critical infrastructure automatically. Capturing and analyzing packet-level traffic flowing through such a network is an essential requirement for problems such as legacy network mapping and fault detection. Within the framework of captured network traffic, we present a simple modeling technique, which supports the mapping of the SCADA network topology via traffic monitoring. By characterizing atomic network components in terms of their input-output topology and the relationship between their data traffic logs, we show that these modeling primitives have good compositional behaviour, which allows complex networks to be modeled. Finally, the predictions generated by our model are found to be in good agreement with experimentally obtained traffic.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||Supervisory Control and Data Acquisition (SCADA) Topology, Network mapping, Network Modeling, Network traffic analysis|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000)|
|Divisions:||Current > Schools > School of Electrical Engineering & Computer Science
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2015, Australian Computer Society, Inc.|
|Copyright Statement:||This paper appeared at the Thirty-Eighth Australasian Computer Science Conference (ACSC2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 159, David Parry,
Ed. Reproduction for academic, not-for-profit purposes permitted provided
this text is included.
|Deposited On:||28 Jan 2015 23:08|
|Last Modified:||03 Mar 2015 12:00|
Repository Staff Only: item control page