ATTACKING SYSTEMS AND DEFENSE POLICIES IN DEPTH IN LINUX VIRTUAL MACHINE ON SCADA SYSTEMS

DSpace Repository

Show simple item record

dc.contributor.author Dakoli, Bashkim
dc.date.accessioned 2025-01-23T11:28:01Z
dc.date.available 2025-01-23T11:28:01Z
dc.date.issued 2024-06-25
dc.identifier.uri http://dspace.epoka.edu.al/handle/1/2364
dc.description.abstract This thesis explores the vulnerabilities and defense mechanisms of Supervisory Control and Data Acquisition (SCADA) systems. It is consolidated with a focus on Linux virtual machine environments. SCADA systems are critical for industrial automation and control. It is making them prime targets for cyber-attacks. The research encompasses a comparative analysis of various SCADA testbeds. This to identify the most effective platform for simulating and testing security measures. Additionally, the study investigates common SCADA attack vectors. Also evaluates different types of SCADA malware. We aim providing a comprehensive understanding of the threats faced by these systems. By simulating attacks and deploying malware in a controlled environment, the research assesses the effectiveness of various defense mechanisms. It is including intrusion detection systems and network segmentation techniques. The findings aim to inform the development of more resilient SCADA systems. Also enhance the overall security posture of industrial control environments. en_US
dc.language.iso en en_US
dc.subject SCADA, cyber-attacks, defense mechanisms, Linux virtual machine, testbeds, industrial control systems, malware analysis, intrusion detection, network security en_US
dc.title ATTACKING SYSTEMS AND DEFENSE POLICIES IN DEPTH IN LINUX VIRTUAL MACHINE ON SCADA SYSTEMS en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account