Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Adoption and Assessment of Machine Learning Algorithms in Security Operations Centre for Critical Infrastructure

    Perception of establishing a Security Operations Centre (SOC) depends on the criticality of information assurance and security operations in response to the ever-changing security threat landscape and adoption...

    M. V. Yeshwanth, Rajesh Kalluri, M. Siddharth Rao, R. K. Senthil Kumar in ISUW 2020 (2022)

  2. No Access

    Chapter and Conference Paper

    Critical Infrastructure Asset Discovery and Monitoring for Cyber Security

    With ever growing cyber threats on critical infrastructures, need of deploying the security measures to protect these should be of utmost priority. However, without knowing about the assets in the network and ...

    Reddi Hareesh, R. K. Senthil Kumar, Rajesh Kalluri, B. S. Bindhumadhava in ISUW 2020 (2022)

  3. No Access

    Chapter and Conference Paper

    Impact Analysis of Attacks Using Agent-Based SCADA Testbed

    Supervisory Control and Data Acquisition (SCADA) systems are used to control and monitor the critical infrastructure such as electricity, gas, water. SCADA system networks are originally started as local contr...

    M. Siddharth Rao, Rajesh Kalluri in ISGW 2017: Compendium of Technical Papers (2018)

  4. No Access

    Chapter and Conference Paper

    Analysis of Communication Channel Attacks on Control Systems—SCADA in Power Sector

    Usage of open standard protocols such as IEC 60870-5-101/104 in supervisory control and data acquisition (SCADA) systems which are not provided with security features leaves vulnerabilities for the attacker. A...

    Rajesh Kalluri, Lagineni Mahendra in ISGW 2017: Compendium of Technical Papers (2018)

  5. Article

    SCADA communication protocols: vulnerabilities, attacks and possible mitigations

    Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to...

    Durga Samanth Pidikiti, Rajesh Kalluri, R. K. Senthil Kumar in CSI Transactions on ICT (2013)