Reference Hub10
Autonomic Computing Architecture for SCADA Cyber Security

Autonomic Computing Architecture for SCADA Cyber Security

Sajid Nazir, Shushma Patel, Dilip Patel
Copyright: © 2017 |Volume: 11 |Issue: 4 |Pages: 14
ISSN: 1557-3958|EISSN: 1557-3966|EISBN13: 9781522511724|DOI: 10.4018/IJCINI.2017100104
Cite Article Cite Article

MLA

Nazir, Sajid, et al. "Autonomic Computing Architecture for SCADA Cyber Security." IJCINI vol.11, no.4 2017: pp.66-79. http://doi.org/10.4018/IJCINI.2017100104

APA

Nazir, S., Patel, S., & Patel, D. (2017). Autonomic Computing Architecture for SCADA Cyber Security. International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), 11(4), 66-79. http://doi.org/10.4018/IJCINI.2017100104

Chicago

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI) 11, no.4: 66-79. http://doi.org/10.4018/IJCINI.2017100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.