Analysis of SCADA System Vulnerabilities to DDoS Attacks

被引:0
作者
Markovic-Petrovic, Jasna D. [1 ]
Stojanovic, Mirjana D. [2 ]
机构
[1] CE Djerdap HPP Ltd, Kralj Marka 2, Negotin, Serbia
[2] Univ Belgrade, Fac Transport & Traff Engn, Belgrade, Serbia
来源
2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2 | 2013年
关键词
Network security; Distributed Denial of Service; SCADA; Simulation; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.
引用
收藏
页码:591 / 594
页数:4
相关论文
共 10 条
[1]  
[Anonymous], 2004, TECHN INF B NCS
[2]  
[Anonymous], OPNET IT GUR AC ED T
[3]  
Barnes K., 2004, INEELEXT0401710
[4]  
Camenisch J., 2012, COMPUTER NETWORKS, V56, P3825
[5]   Internet infrastructure security: A taxonomy [J].
Chakrabarti, A ;
Manimaran, G .
IEEE NETWORK, 2002, 16 (06) :13-21
[6]  
CIGRE Technical Brochures, 2004, WGD207 CIGR TECHN BR
[7]  
Krutz R.L., 2005, SECURING SCADA SYSTE
[8]   Survey of network-based defense mechanisms countering the DoS and DDoS problems [J].
Peng, Tao ;
Leckie, Christopher ;
Ramamohanarao, Kotagiri .
ACM COMPUTING SURVEYS, 2007, 39 (01)
[9]  
Tsiakis T, 2010, INT J COMPUT SCI NET, V10, P7
[10]  
Zhu B., 2011, P CPSCOM 2011 4 IEEE