Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)

被引:1
|
作者
Sogut, Esra [1 ]
Erdem, O. Ayhan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi Bolumu, Teknol Fak, Ankara, Turkey
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2020年 / 23卷 / 02期
关键词
Scada; ics; modbus; cyber terror; cyber attack;
D O I
10.2339/politeknik.562570
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Supervisory Control and Data Acquisition Systems or Industrial Control Systems are the systems that control the critical infrastructures that are considered important. Attacks against critical infrastructures are considered as cyber terror attacks. Continuity of the operation of these critical infrastructures and ensuring the security of these critical infrastructures against cyber terror attacks are great importance. In this study, a data set of the gas pipeline control system, which is one of the critical infrastructures, is used. In the data set, several attacks were performed in the categories such as command injection, reconnaissance and denial of service for Modbus protocol which is one of the existing SCADA protocols. In this way, it is aimed to investigate and evaluate the behaviors of attacked and non-attacked situations. In addition, it is aimed to detect the attack. For this purpose, data mining method has been used with various algorithms on the data set. According to the analysis results, the most accurate classification rate is provided by Random Tree algorithm. By analyzing the results of this algorithm, cyber terror attack behaviors were determined and thus, an important contribution was made to the field of cyber terror attacks. In order to ensure cyber security of Supervisory Control and Data Acquisition Systems or Industrial Control Systems, such studies need to be carried out further and new data sets should be produced and put into use.
引用
收藏
页码:557 / 566
页数:10
相关论文
共 50 条
  • [21] Study on attack paths of cyber attack in cyber-physical power systems
    Chen, Lei
    Yue, Dong
    Dou, Chunxia
    Chen, Jianbo
    Cheng, Zihao
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (12) : 2352 - 2360
  • [22] Current cyber-defense trends in industrial control systems
    Enrique Rubio, Juan
    Alcaraz, Cristina
    Roman, Rodrigo
    Lopez, Javier
    COMPUTERS & SECURITY, 2019, 87
  • [23] A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure
    Eden, Peter
    Blyth, Andrew
    Burnap, Pete
    Cherdantseva, Yulia
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 27 - 39
  • [24] Review on Cyber Vulnerabilities of Communication Protocols in Industrial Control Systems
    Xu, Yikai
    Yang, Yi
    Li, Tianran
    Ju, Jiaqi
    Wang, Qi
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [25] Cyber Attack Protection and Control of Microgrids
    Rana, Md Masud
    Li, Li
    Su, Steven W.
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2018, 5 (02) : 602 - 609
  • [26] Finite-time Cluster Synchronization Control of Cyber-Physical Systems under Cyber Attack
    Huang, Yang-Cheng
    Li, Jun-Yi
    Rao, Hong-Xia
    Chen, Hui
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 948 - 953
  • [27] Cyber Attack Protection and Control of Microgrids
    Md Masud Rana
    Li Li
    Steven W.Su
    IEEE/CAAJournalofAutomaticaSinica, 2018, 5 (02) : 602 - 609
  • [28] ICS Cyber Attack Analysis and a New Diagnosis Approach
    Yilmaz, Ercan Nurcan
    Sayan, Hasan Huseyin
    Ustunsoy, Furkan
    Gonen, Serkan
    Sindiren, Erhan
    Karacayilmaz, Gokce
    ARTIFICIAL INTELLIGENCE AND APPLIED MATHEMATICS IN ENGINEERING PROBLEMS, 2020, 43 : 127 - 141
  • [29] Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights
    Haque, Md Ariful
    De Teyou, Gael Kamdem
    Shetty, Sachin
    Krishnappa, Bheshaj
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 25 - 30
  • [30] Using Attack Trees to Assess Security Controls for Supervisory Control and Data Acquisition Systems (SCADA)
    Lopez, Juan, Jr.
    Nielsen, Jason
    Hemmes, Jeffrey
    Humphries, Jeffrey
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 166 - 177