TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
|
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [1] A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure
    Eden, Peter
    Blyth, Andrew
    Burnap, Pete
    Cherdantseva, Yulia
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 27 - 39
  • [2] Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 242 - 249
  • [3] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510
  • [4] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [5] False Logic Attacks on SCADA Control System
    Li, Weize
    Xie, Lun
    Liu, Daqian
    Wang, Zhiliang
    2014 ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2014, : 136 - 140
  • [6] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852
  • [7] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [8] Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
    Ciancamerla, E.
    Minichino, M.
    Palmieri, S.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 123 - 134
  • [9] Petri Net Model of Insider Attacks in SCADA System
    Nasr, Payam Mahmoudi
    Varjani, Ali Yazdian
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 55 - 60
  • [10] Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
    Maynard, Peter
    McLaughlin, Kieran
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 287 - 294