New intrusion detection systems boost protection of SCADA systems against cyber threats

April 03, 2026 at 8:00 AM
Emiliano Bellini
PV Magazine (International) Solar_Renewables PV Modules Controls, PLC & Industrial Automation ✓ Processed

AI Analysis

Relevance Score: 0.80/1.0

Summary

An international reserch team developed two deep learning-based IDS models to enhance cybersecurity in SCADA systems. The hybrid approach reportedly improves detection of complex and novel cyber threats with high accuracy, adaptability, and efficiency, outperforming traditional methods across multiple datasets.

<p class="p1"><span class="s1">An international reserch team developed two deep learning-based IDS models to enhance cybersecurity in SCADA systems. The hybrid approach reportedly improves detection of complex and novel cyber threats with high accuracy, adaptability, and efficiency, outperforming traditional methods across multiple datasets.</span></p><p>A Saudi-British research team has develeped two new deep learning-based intrusion detection systems (IDSs) that can reportedly improve the cybersecurity of <a href="https://www.pv-magazine.com/2026/03/16/new-framework-promises-unprecedented-level-of-cybersecurity-for-scada-systems/" rel="noopener" target="_blank">SCADA networks</a>.</p>
<p>In large-scale solar power plants, SCADA systems play a vital role by overseeing energy generation, monitoring the performance of solar panels, optimizing output, identifying potential faults, and maintaining smooth overall operations. In essence, they act as the central system that converts raw solar data into practical control decisions, ensuring the plant operates safely, efficiently, and profitably.</p>
<p>The scientists explaind that current cybersecurity frameworks are often inadequate for SCADA systems because they cannot fully cope with the complexity and constantly evolving nature of modern cyber threats. Most existing approaches rely on signature-based detection, which depends on prior knowledge of attack patterns and therefore fails to detect zero-day exploits or novel intrusion techniques.</p>
<p>To address this limitation, the researchers considered deep learning methods, as these techniques allows to process large volumes of data, identify complex patterns, and enable more proactive threat detection.</p>
<p>&#8220;Such capability of handling and analyzing big data is particularly useful during scenarios when SCADA systems are generating huge streams of real-time data, including sensor readings, control commands, and other system logs,&#8221; they explained. &#8220;Furthermore, deep learning methods, especially convolutional neural networks (CNNs) and recurrent neural networks (RNNs), have shown outstanding performances in the detection of complex attack scenarios with sequential or spatial patterns in data.&#8221;</p>
<p><span><div class="callout alignnone "><div class="callout-body"> </span><strong>Do you want to strengthen and enhance the cyber security of your solar energy assets to safeguard them against emerging threats?</strong></p>
<p>Join us on Apr. 29 for<b> <a href="https://www.pv-magazine.com/webinars/webinarplus-cyberattack/" rel="noopener" target="_blank">pv magazine <span class="mark5ehua924b">Webinar</span>+ | </a></b><a href="https://www.pv-magazine.com/webinars/webinarplus-cyberattack/" rel="noopener" target="_blank"><strong>Decoding the first massive cyberattack on Europe’s solar energy infrastructure – The Poland case and lessons learned</strong></a></p>
<p><span class="break-words tvm-parent-container"><span dir="ltr"> Industry experts </span></span>will explore real-world cyberattack scenarios, highlight potential vulnerabilities in solar and storage systems, and share practical, actionable strategies to protect your energy assets. Attendees will gain valuable knowledge on how to anticipate, prevent, and respond to cyber threats in the rapidly evolving solar energy sector.</div></div>
<p>The proposed approach integrates two new IDSs, named the Spike Encoding Adaptive Regulation Kernel (SPARK) and the Scented Alpine Descent (SAD) algorithm. By leveraging their complementary strengths, the method reportedly improves spike-threshold accuracy while enhancing adaptability and robustness under dynamic conditions.</p>
<p>The SPARK model introduces adaptive spike encoding by dynamically adjusting thresholds based on input signal characteristics. It uses advanced statistical methods to respond to variations in neural input, improving sensitivity to changes in intensity and frequency. By integrating both temporal and spatial features, SPARK enhances information encoding, especially for complex datasets. Unlike traditional fixed-threshold methods, it provides context-aware thresholding, improving accuracy and reliability.</p>
<p>The SAD algorithm complements SPARK by offering an optimization strategy inspired by olfactory navigation, which is the process by which animals and organisms use odor cues to locate food, mates, or home, and Lévy flight behavior, which is a strategy obeserved in many animal species to randomly search for a target in an unknown environment. This purportedly enables efficient exploration of solution spaces and avoids local minima, ensuring optimal threshold selection.</p>
<p>The hybrid approach can dynamically adjust and optimize spike thresholds simultaneously, surpassing conventional static or isolated approaches, according to scientists, which noted that the SPARK model is well-suited for SCADA and IoT systems due to its scalability, real-time adaptability, and efficient data handling. Additionally, its lightweight design reduces computational overhead and false positives, making it effective for resource-constrained environments.</p>
<p>&#8220;SAD is complementary to SPARK in the sense that it focuses on improving the detection accuracy while maintaining computational efficiency,&#8221; the researchers emphasized. &#8220;SAD's anomaly scoring mechanism can be integrated into this framework to add another layer of detection, which can run parallel with SPARK. In effect, integrating the deep learning models into the scoring mechanism means that SAD would enable a much more fine-grained analysis of attack patterns with little noticeable impact on performance for the SCADA system in question.&#8221;</p>
<p>The researchers used multiple benchmark datasets are used to evaluate SCADA intrusion detection performance, including the <span class="T286Pc">Secure Water Treatment (SWaT) testbed</span>, Gas Pipeline, WUSTL-IIoT, and Electra. These datasets capture diverse industrial environments, attack types, and operational conditions, enabling comprehensive testing. They also include time-series sensor data, actuator commands, and labeled attack scenarios such as denial-of-service (DoS), distributed denial-of-service (DDoS), malware, and injection attacks.</p>
<p>The diversity of datasets ensured accurate modeling of both normal behavior and complex anomalies in SCADA and IIoT systems, according to the research team. Standardized preprocessing, training, and evaluation procedures also enabled comparison across all tested models. Cross-validation and controlled training conditions, meanwhile, reportedly prevented bias and ensured reliable generalization results. Visualization tools such as histograms, loss curves, and confusion matrices provided insights into model behavior and anomaly detection.</p>
<p>The SPARK model was found to consistently demonstrate &#8220;superior&#8221; performance, achieving high accuracy, precision, and recall across datasets. It outperformed traditional machine learning and deep learning approaches in detecting diverse intrusion types.<br /><br />&#8220;The findings underline, in summary, that the SPARK and SAD models are basically the final frontier in modern intrusion detection,&#8221; the scientists said. &#8220;Distinctly designed to provide improved detection capabilities and operational efficiency, the two designs also chart a way into more resilient and intelligent security solutions for modern industrial controlled systems (ICSs) and Internet-of-Things (IoT) networks.&#8221;</p>
<p>The novel IDSs have been presented in &#8220;<span class="title-text"><a href="https://www.sciencedirect.com/science/article/pii/S1874548225000204" rel="noopener" target="_blank">SPARK and SAD: Leading-edge deep learning frameworks for robust and effective intrusion detection in SCADA systems</a>,&#8221; published in the <em>International Journal of Critical Infrastructure Protection</em>. The research team comprised academics form the Leeds Beckett University in the United Kingdom and King Abdulaziz University in Saudi Arabia. </span></p>

📝 RSS Summary Only
Tags: Markets & Policy Renewables PV Energy Storage cybersecurity Energy cyberattack Legal Utility Scale PV Solar PV Policy Renewable Energy photovoltaic Solar Power cyberattacks cyber threats Utility Scale Storage Technology and R&D photovoltaics Markets renewable energies solar energy solar panels Solar Grids & Integration Technology
RSS Categories: Grids & Integration
Collected 1 day, 8 hours ago
View Original Article