Assessment of SCADA System Vulnerabilities

被引:0
作者
Yadav, Geeta [1 ]
Paul, Kolin [1 ,2 ]
机构
[1] IIT Delhi, Sch Informat Technol, New Delhi, India
[2] TalTech, Sch Informat Technol, Tallinn, Estonia
来源
2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA) | 2019年
关键词
SCADA; NVD; Vulnerability assessment;
D O I
10.1109/etfa.2019.8869541
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA system is an essential component for automated control and monitoring in many of the Critical Infrastructures (CI). Cyber-attacks like Stuxnet, Aurora, Maroochy on SCADA systems give us clear insight about the damage a determined adversary can cause to any country's security, economy, and health-care systems. An in-depth analysis of these attacks can help in developing techniques to detect and prevent attacks. In this paper, we focus on the assessment of SCADA vulnerabilities from the widely used National Vulnerability Database (NVD) until May 2019. We analyzed the vulnerabilities based on severity, frequency, availability, integrity and confidentiality impact, and Common Weaknesses. The number of reported vulnerabilities are increasing yearly. Approximately 89% of the attacks are the network exploits severely impacting availability of these systems. About 19% of the weaknesses are due to buffer errors due to the use of insecure and legacy operating systems. We focus on finding the answer to four key questions that are required for developing new technologies for securing SCADA systems. We believe this is the first study of its kind which looks at correlating SCADA attacks with publicly available vulnerabilities. Our analysis can provide security researchers with useful insights into SCADA critical vulnerabilities and vulnerable components, which need attention. We also propose a domain-specific vulnerability scoring system for SCADA systems considering the interdependency of the various components.
引用
收藏
页码:1737 / 1744
页数:8
相关论文
共 18 条
  • [1] [Anonymous], 2016, ANAL CYBER ATTACK UK
  • [2] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    [J]. COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [3] Christey R. A. M. Steve, 2007, VULNERABILITY TYPE D
  • [4] Colelli R, 2018, IEEE INT C EMERG, P1171, DOI 10.1109/ETFA.2018.8502495
  • [5] Predicting Exploitations of Information Systems Vulnerabilities Through Attackers' Characteristics
    Dobrovoljc, Andrej
    Trcek, Denis
    Likar, Borut
    [J]. IEEE ACCESS, 2017, 5 : 26063 - 26075
  • [6] Fovino I. N., 2009, CRITICAL INFRASTRUCT
  • [7] Frühwirth C, 2009, INT SYMP EMP SOFTWAR, P536
  • [8] Ghani A. K. N. A. N. S. H., 2013, C RISK SEC INT SYST
  • [9] Humayed A., 2017, IEEE INTERNET THINGS, V4662, P1
  • [10] Kopetz H., 1997, REAL TIME SYSTEMS DE