Projects

DSTN > Projects > CyberScada

Responsible Researchers:
ACE OOAK-Park, Nigeria
○ Professor Aderounmu G. A., Obafemi Awolowo University, Ile-Ife, Nigeria.
○ Dr. Olajubu E. A., Obafemi Awolowo University, Ile-Ife, Nigeria
○ Dr. Akinyemi B.O., Obafemi Awolowo University, Ile-Ife, Nigeria
○ Dr. Sanni M. L., Obafemi Awolowo University, Ile-Ife, Nigeria.

ACE SMIA, Benin
○ Dr. Jules Dégila, University of Abomey-Calavi, Benin
○ Dr. Arnaud Ahouandjinou, Université d'Abomey-Calavi, Benin
○ Dr. Pélagie Hounguè, University of Abomey-Calavi, Benin
○ Dr. Ratheil Hoindji, University of Abomey-Calavi, Benin

DSTN > Projects > CyberScada

Development of an intrusion detection model based on adaptive bio-optimization for Supervisory Control and Data Acquisition (SCADA) systems

Research project (4 years)


With the advent of technology, critical infrastructures (CI) are for the most part managed by control systems; typically, Supervisory Control and Data Acquisition (SCADA) systems. Considerations on the monitoring and control of these facilities are receiving increased research attention as CI migrates to cyberspace, particularly in the current digital transformation of electricity, transport, telecommunications, chemical plants, oil and gas. A cyber-attack on a SCADA system can have devastating consequences for the public safety, health and economy of individuals, businesses and government. An estimated 56% of security breaches were reported between the end of 2018 and mid-2019 (Paganini, 2020). Consequently, attacks on SCADA systems in cyberspace are evolving as its security threats and vulnerabilities change dimension.

Thus, the problem of intrusion is inevitable, including vulnerabilities in SCADA protocols. Existing SCADA intrusion detection systems (IDS) have been developed using conventional or bio-inspired solutions. Bio-inspired solutions are innovations inspired by nature, with advantages in terms of speed, adaptation and scalability. The Modbus SCADA network has a weak security mechanism, while the distributed network protocol (DPN3) has none. Consequently, this study deals with the monitoring of security threats. In addition, SCADA network vulnerabilities are addressed with a view to developing an improved architecture for communication functions.

The project aims to select and collect a dataset in a given SCADA system domain, design its conceptual framework, while an optimized mathematical model will be formulated and validated. SCADA-specific performance metrics will be used to evaluate the model in a MATLAB environment, using detection latency and accuracy, sensitivity and specificity.

An adaptive, bio-optimized IDS prototype will be developed and architectural support for security monitoring on SCADA networks will be provided. This study will contribute to bio-inspiration models by providing a model whose parameters can be modeled in real computer signal transmission, including an improved architecture based on security-sensitive protocols.

Any IC attack is a real threat to national safety and security. The outcome of this study will mitigate socio-economic issues for sustainable economic growth and development in light of today's digital transformation, while supporting the health and safety of citizens.

Keywords:
Digital science research topics: Cybersecurity, SCADA, intrusion, detection, bio-optimization, critical infrastructures.
Other research topics and application areas: Industrial automation, cyberspace, cyber-attacks, control systems.