I. Introduction
Supervisory control and data acquisition (SCADA) [1] is a control system architecture that uses computers with network-based data communications used for high-level process control management. Interfaces that allow monitoring and commands, such as set point data changes, display the measurement results of the instruments in the field. This real time control is performed by sensors and actuators in the field connected to the module through the network [2]. SCADA controls many important infrastructure such as power grids, water treatment systems, nuclear power plants, controlling raw materials of a production process [3]. SCADA system is a very attractive target among cyber crime and hackers because this system controls the critical infrastructure that greatly affects the economy of a country or industry [2]. Consequences of cyber attacks could have an impact on SCADA System infrastructure damage, as controls are not controlled by the system, but are controlled by cyber. SCADA consists of Programmable Logic Controllers (PLCs), Human Machinery Interface (HMI), instrument measurement sensors in the field and other supporting devices [2], [4]. In older systems, SCADA components connect using a special network so that the SCADA system is assumed to be secure. But with technological developments [4] [5] demanding standardization of protocols so that all devices from various vendors can be used. Standard protocols generally use the Transfer Control Protocol (TCP) Internet Protocol (IP). Under certain conditions SCADA systems require connecting to the internet to obtain licenses and software updates from vendors. With TCP / IP-based SCADA network conditions and connected to the internet, the system becomes vulnerable and gets threats from outside parties.