This article will provide information about the installation, configuration, development and testing of an intrusion detection system that can detect attacks to a SCADA system. Firstly, this article will provide information about SCADA system, communication protocols of SCADA system and Intrusion Detection System Architecture. Then, it tell how to install…