TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
|
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [31] Cyber Threat Investigation of SCADA Modbus Activities
    Fachkha, Claude
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [32] Cyber Threats and Defence Approaches in SCADA systems
    Kang, Dong-Ho
    Kim, Byoung-Koo
    Na, Jung-Chan
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 324 - 327
  • [33] Detecting Cyber Threats with Limited Dataset using Generative Adversarial Network on SCADA System
    Park, Chol Hyun
    Jo, Ju-Yeon
    Kim, Yoohwan
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 915 - 919
  • [34] A Testbed for SCADA Cyber Security and Intrusion Detection
    Singh, Prateek
    Garg, Saurabh
    Kumar, Vinod
    Saquib, Zia
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [35] Stealthy Deception Attacks Against SCADA Systems
    Kleinmann, Amit
    Amichay, Ori
    Wool, Avishai
    Tenenbaum, David
    Bar, Ofer
    Lev, Leonid
    COMPUTER SECURITY, 2017, 2018, 10683 : 93 - 109
  • [36] Passive Inference of Attacks on SCADA Communication Protocols
    Bou-Harb, Elias
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 62 - 67
  • [37] Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
    Qassim, Qais Saif
    Jamil, Norziana
    Z'aba, Muhammad Reza
    Kamarulzaman, Wan Azlan Wan
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2020, 16 (02) : 91 - 106
  • [38] Assessing and augmenting SCADA cyber security: A survey of techniques
    Nazir, Sajid
    Patel, Shushma
    Patel, Dilip
    COMPUTERS & SECURITY, 2017, 70 : 436 - 454
  • [39] Cyber security risk assessment for SCADA and DCS networks
    Ralston, P. A. S.
    Graham, J. H.
    Hieb, J. L.
    ISA TRANSACTIONS, 2007, 46 (04) : 583 - 594
  • [40] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354