|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 187 - Issue 75 |
| Published: January 2026 |
| Authors: Farisha K.R., M. Nandhini, Sreeveni P.A. |
10.5120/ijca2026926292
|
Farisha K.R., M. Nandhini, Sreeveni P.A. . Intrusion Detection in SCADA Networks: From Traditional Approaches to Graph Convolutional Networks. International Journal of Computer Applications. 187, 75 (January 2026), 34-39. DOI=10.5120/ijca2026926292
@article{ 10.5120/ijca2026926292,
author = { Farisha K.R.,M. Nandhini,Sreeveni P.A. },
title = { Intrusion Detection in SCADA Networks: From Traditional Approaches to Graph Convolutional Networks },
journal = { International Journal of Computer Applications },
year = { 2026 },
volume = { 187 },
number = { 75 },
pages = { 34-39 },
doi = { 10.5120/ijca2026926292 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2026
%A Farisha K.R.
%A M. Nandhini
%A Sreeveni P.A.
%T Intrusion Detection in SCADA Networks: From Traditional Approaches to Graph Convolutional Networks%T
%J International Journal of Computer Applications
%V 187
%N 75
%P 34-39
%R 10.5120/ijca2026926292
%I Foundation of Computer Science (FCS), NY, USA
Supervisory Control and Data Acquisition (SCADA) systems are widely used to control and monitor critical infrastructure such as power plants and water treatment facilities. These systems are part of Industrial Control Systems (ICS) and are increasingly integrated with IT and cloud infrastructures, which has significantly increased their exposure to cyber-attacks. To address these security challenges, several protective mechanisms have been developed for SCADA networks, among which intrusion detection systems (IDS) play a crucial role. This survey presents a comparative study of existing IDS approaches applied in SCADA systems, ranging from traditional rule-based, signature-based, and anomaly-based models to advanced machine learning and deep learning techniques. Furthermore, the strengths and limitations of these IDS approaches are analyzed to identify existing research gaps in SCADA-specific intrusion detection. Finally, a methodological direction aimed at improving IDS performance for effective detection and prevention of cyber-attacks on SCADA systems is discussed, providing valuable guidance for future research on SCADA-specific IDS.