Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)

被引:1
|
作者
Sogut, Esra [1 ]
Erdem, O. Ayhan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi Bolumu, Teknol Fak, Ankara, Turkey
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2020年 / 23卷 / 02期
关键词
Scada; ics; modbus; cyber terror; cyber attack;
D O I
10.2339/politeknik.562570
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Supervisory Control and Data Acquisition Systems or Industrial Control Systems are the systems that control the critical infrastructures that are considered important. Attacks against critical infrastructures are considered as cyber terror attacks. Continuity of the operation of these critical infrastructures and ensuring the security of these critical infrastructures against cyber terror attacks are great importance. In this study, a data set of the gas pipeline control system, which is one of the critical infrastructures, is used. In the data set, several attacks were performed in the categories such as command injection, reconnaissance and denial of service for Modbus protocol which is one of the existing SCADA protocols. In this way, it is aimed to investigate and evaluate the behaviors of attacked and non-attacked situations. In addition, it is aimed to detect the attack. For this purpose, data mining method has been used with various algorithms on the data set. According to the analysis results, the most accurate classification rate is provided by Random Tree algorithm. By analyzing the results of this algorithm, cyber terror attack behaviors were determined and thus, an important contribution was made to the field of cyber terror attacks. In order to ensure cyber security of Supervisory Control and Data Acquisition Systems or Industrial Control Systems, such studies need to be carried out further and new data sets should be produced and put into use.
引用
收藏
页码:557 / 566
页数:10
相关论文
共 50 条
  • [1] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [2] Analysis of Cyber Security for Industrial Control Systems
    Drias, Zakarya
    Serhrouchni, Ahmed
    Vogel, Olivier
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [3] Analysis on Cyber Threats to SCADA systems
    Kang, Dong-Joo
    Lee, Jong-Joo
    Kim, Seog-Joo
    Park, Jong-Hyuk
    T& D ASIA: 2009 TRANSMISSION & DISTRIBUTION CONFERENCE & EXPOSITION: ASIA AND PACIFIC, 2009, : 14 - +
  • [4] A hybrid cyber defense framework for reconnaissance attack in industrial control systems
    Qin, Xingsheng
    Jiang, Frank
    Dong, Chengzu
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 136
  • [5] Cyber Wargaming on SCADA Systems
    Colbert, Edward
    Sullivan, Daniel
    Kott, Alexander
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 96 - 104
  • [6] Modeling Cyber-Attack for SCADA Systems Using CoPNet Approach
    El Bouchti, Abdelali
    Haqiq, Abdelkrim
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 481 - 486
  • [7] Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems
    Sandor, Hunor
    Genge, Bela
    Szanto, Zoltan
    Marton, Lorinc
    Haller, Piroska
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 152 - 168
  • [8] Process Discovery for Industrial Control System Cyber Attack Detection
    Myers, David
    Radke, Kenneth
    Suriadi, Suriadi
    Foo, Ernest
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 61 - 75
  • [9] Detecting the Network Attack Vectors on SCADA Systems
    Ramachandruni, Ram Sandesh
    Poornachandran, Prabaharan
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 707 - 712
  • [10] A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis
    Abdo, H.
    Kaouk, M.
    Flaus, J. -M.
    Masse, F.
    COMPUTERS & SECURITY, 2018, 72 : 175 - 195