TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [41] Analysis of ICS and SCADA Systems Attacks Using Honeypots
    Mesbah, Mohamed
    Elsayed, Mahmoud Said
    Jurcut, Anca Delia
    Azer, Marianne
    FUTURE INTERNET, 2023, 15 (07):
  • [42] Flood Risks of Cyber-Physical Attacks in a Smart Storm Water System
    Lin, Chung-Yi
    Yang, Yi-Chen Ethan
    Moazeni, Faegheh
    WATER RESOURCES RESEARCH, 2024, 60 (01)
  • [43] Towards implementing scalable and reconfigurable SCADA security testbed in power system environment
    Qassim, Qais Saif
    Jamil, Norziana
    Daud, Maslina
    Hasan, Hafizah Che
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2019, 15 (02) : 91 - 120
  • [44] Calculation of Cyber Security Index in the Problem of Power System State Estimation Based on SCADA and WAMS Measurements
    Kolosok, Irina
    Gurina, Liudmila
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2014), 2016, 8985 : 172 - 177
  • [45] Modelling Physical Impact of Cyber Attacks
    Lemay, Antoine
    Fernandez, Jose
    Knight, Scott
    2014 WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (MSCPES), 2014,
  • [46] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [47] A SCADA Testbed for Investigating Cyber Security Vulnerabilities in Critical Infrastructures
    Tesfahun, Abebe
    Bhaskari, D. Lalitha
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (01) : 54 - 62
  • [48] Cyber Security Risk Management in the SCADA Critical Infrastructure Environment
    Henrie, Morgan
    ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 38 - 45
  • [49] Results From a SCADA-Based Cyber Security Competition
    Novak, Heath
    Likarish, Dan
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 177 - 182
  • [50] Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)
    Sogut, Esra
    Erdem, O. Ayhan
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2020, 23 (02): : 557 - 566