Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 8 No 12 (2024): Volume 8, Issue 12, December 2024 | Pages: 20-23
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 09-12-2024
In today's growing cyber attack, where the critical infrastructure of a country's communications and services can quickly be eliminated by hostile attacks, the protection of vital infrastructure and advanced cyber security is needed at all times. In fact, security defects for such systems can lead to widespread destruction and consequences in different layers of society. The SCADA system (information control and collection control system (process control system is computer -based. It monitors and interacts with the physical process of the remote road. This system collects information about the physical process conditions; the system is widely used in large industries such as petrochemicals, water distribution and nuclear power plants. Monitoring the proper performance of the process is provided on large control panels that allow the operator to allow the operator. With the introduction of telemetry, the conditions for connecting the equipment used in this infrastructure are created. In fact, the term SCADA refers to a technology that creates conditions for controlling and monitoring such infrastructures from a central control room. For example, this technology can be used in water distribution facilities to check the water level in the water storage tank, as well as monitor the flow and pressure in the pipe. The SCADA system enables the intelligent collection of information from various parts for the user and provides real-time monitoring of all processes, and may also warn in the event of an error and the operator can react by sending commands to work equipment compared to process changes.
SCADA system, whale algorithm, machine learning, classification, water distribution facilities
Jenan Jader Msad, Dhulfikar Dhurgham Husam, & Mustafa Husham Abbas. (2024). Exposing to Infiltrate SCADA Using Whale Algorithm and Support Carrier. International Research Journal of Innovations in Engineering and Technology - IRJIET, 8(12), 20-23. Article DOI https://doi.org/10.47001/IRJIET/2024.812003
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence