CYBER ATTACKS on SCADA BASED TRAFFIC LIGHT CONTROL SYSTEMS in the SMART CITIES

dc.contributor.authorÖzarpa, C.
dc.contributor.authorAvcl, A.
dc.contributor.authorKlnacl, B.F.
dc.contributor.authorArapoAlu, S.
dc.contributor.authorKara, S.A.
dc.date.accessioned2024-09-29T16:16:03Z
dc.date.available2024-09-29T16:16:03Z
dc.date.issued2021
dc.departmentKarabük Üniversitesien_US
dc.description6th International Conference on Smart City Applications -- 27 October 2021 through 29 October 2021 -- Safranbolu -- 175815en_US
dc.description.abstractThere are regular developments and changes in cities. Developments in cities have affected transportation, and traffic control tools have changed. Traffic signs and traffic lights have been used to direct pedestrians and vehicles correctly. Traffic light control systems are used to ensure the safety of vehicles and pedestrians, increase the fluency in traffic, guide them in transportation, warn pedestrians and drivers, and regulate and control transportation disruptions. In order to facilitate people's lives, it is desired to control the traffic components autonomously with the developments in autonomous systems. Cyber threats arise due to the active use of the internet and signals or frequencies in the use of modules that will provide communication with traffic lights, traffic signs, and vehicles, which are traffic components at the inter-sections of many roads in the control of central systems. The study is limited to smart traffic lights, which are traffic components. If we examine the cyber-Attacks, we can see that Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks can be made. Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks. Intrusion detection systems tell us whether the data poses a threat or does not pose after the data passing through the system is examined. In this way, system protection is ensured by controlling the data traffic in the system. © Author(s) 2021. CC BY 4.0 License.en_US
dc.identifier.doi10.5194/isprs-Archives-XLVI-4-W5-2021-411-2021
dc.identifier.endpage415en_US
dc.identifier.issn1682-1750
dc.identifier.issue4/W5-2021en_US
dc.identifier.scopus2-s2.0-85122320584en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage411en_US
dc.identifier.urihttps://doi.org/10.5194/isprs-Archives-XLVI-4-W5-2021-411-2021
dc.identifier.urihttps://hdl.handle.net/20.500.14619/8833
dc.identifier.volume46en_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherInternational Society for Photogrammetry and Remote Sensingen_US
dc.relation.ispartofInternational Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archivesen_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCyber Risk Analysisen_US
dc.subjectCyber-Attacksen_US
dc.subjectCybersecurityen_US
dc.subjectSmart Traffic Light Systemen_US
dc.subjectSmart Traffic.en_US
dc.titleCYBER ATTACKS on SCADA BASED TRAFFIC LIGHT CONTROL SYSTEMS in the SMART CITIESen_US
dc.typeConference Objecten_US

Dosyalar