Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)

被引:1
|
作者
Sogut, Esra [1 ]
Erdem, O. Ayhan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi Bolumu, Teknol Fak, Ankara, Turkey
来源
JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI | 2020年 / 23卷 / 02期
关键词
Scada; ics; modbus; cyber terror; cyber attack;
D O I
10.2339/politeknik.562570
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Supervisory Control and Data Acquisition Systems or Industrial Control Systems are the systems that control the critical infrastructures that are considered important. Attacks against critical infrastructures are considered as cyber terror attacks. Continuity of the operation of these critical infrastructures and ensuring the security of these critical infrastructures against cyber terror attacks are great importance. In this study, a data set of the gas pipeline control system, which is one of the critical infrastructures, is used. In the data set, several attacks were performed in the categories such as command injection, reconnaissance and denial of service for Modbus protocol which is one of the existing SCADA protocols. In this way, it is aimed to investigate and evaluate the behaviors of attacked and non-attacked situations. In addition, it is aimed to detect the attack. For this purpose, data mining method has been used with various algorithms on the data set. According to the analysis results, the most accurate classification rate is provided by Random Tree algorithm. By analyzing the results of this algorithm, cyber terror attack behaviors were determined and thus, an important contribution was made to the field of cyber terror attacks. In order to ensure cyber security of Supervisory Control and Data Acquisition Systems or Industrial Control Systems, such studies need to be carried out further and new data sets should be produced and put into use.
引用
收藏
页码:557 / 566
页数:10
相关论文
共 50 条
  • [31] The industrial control system cyber defence triage process
    Cook, Allan
    Janicke, Heige
    Smith, Richard
    Maglaras, Leandros
    COMPUTERS & SECURITY, 2017, 70 : 467 - 481
  • [32] Uncovering Industrial Control Systems Vulnerabilities by Examining SCADA Virtual Packages and Their Communication Protocols
    Seo, W. J.
    Sitnikova, E.
    21ST INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2015), 2015, : 725 - 731
  • [33] A Hybrid Cyber Attack Model for Cyber-Physical Power Systems
    Tu, Haicheng
    Xia, Yongxiang
    Tse, Chi K.
    Chen, Xi
    IEEE ACCESS, 2020, 8 : 114876 - 114883
  • [34] Control systems/SCADA forensics, what's the difference?
    van der Knijff, R. M.
    DIGITAL INVESTIGATION, 2014, 11 (03) : 160 - 174
  • [35] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852
  • [36] Cyber attack estimation and detection for cyber-physical power systems
    Li, Lei
    Wang, Wenting
    Ma, Qiang
    Pan, Kunpeng
    Liu, Xin
    Lin, Lin
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2021, 400
  • [37] An Analysis of Cyber Security Attack Taxonomies
    Derbyshire, Richard
    Green, Benjamin
    Prince, Daniel
    Mauthe, Andreas
    Hutchison, David
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161
  • [38] Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator
    Upadhyay, Darshana
    Ghosh, Sagarika
    Ohno, Hiroyuki
    Zaman, Marzia
    Sampalli, Srinivas
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 47
  • [39] Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)
    Ramachandran, Hariharan
    Smith, Richard
    David, Kenny Awuson
    Al-Hadhrami, Tawfik
    Acharya, Parag
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3619 - 3641
  • [40] Attack-Aware Supervisory Control and Data Acquisition (SCADA)
    Alexander, Otis
    Chung, Sam
    Endicott-Popovsky, Barbara
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 251 - 254