Filters








343 Hits in 5.5 sec

Passive Fingerprinting of SCADA in Critical Infrastructure Network without Deep Packet Inspection [article]

Sungho Jeon, Jeong-Han Yun, Seungoh Choi, Woo-Nyon Kim
2016 arXiv   pre-print
Our inference method, which is based on the intrinsic characteristics of SCADA, first identifies the network port used for the SCADA protocol, then consecutively infers the field devices and master server  ...  Unlike existing work, our method does not rely on the functions of a specific product or DPI of the SCADA protocol.  ...  SCADA Protocol Port Inference Observation and Intuition. Our approach toward SCADA protocol port inference is based on our intuitions and observations from experience.  ... 
arXiv:1608.07679v1 fatcat:rbxg6r7m3nbollao34uks4ppni

Random Network Coding for Secure Packet Transmission in SCADA Networks

Sajid Nazir, Mohammad Kaleem
2018 2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)  
Information on SCADA systems and protocols is readily available in public domain, making them a target for malicious attacks.  ...  This design choice resulted in most SCADA protocol implementations being plain text with little security against attackers.  ...  Passive Attack on Modbus Communications In a passive attack, the eavesdropper can access the ongoing communication but does not change it.  ... 
doi:10.1109/iceest.2018.8643329 fatcat:vgyxeniht5b53kowqc3yqrssi4

Security of Cyber-Physical Systems [chapter]

Jose Rubio-Hernan, Juan Rodolfo-Mejias, Joaquin Garcia-Alfaro
2017 Lecture Notes in Computer Science  
We focus on two representative protocols, Modbus and DNP3.  ...  The architecture of the testbed is based on real-world components, and emulates cyber-physical scenarios commanded by SCADA (Supervisory Control And Data Acquisition) technologies.  ...  It has been acknowledged by the Center of excellence in Cybersecurity.  ... 
doi:10.1007/978-3-319-61437-3_1 fatcat:khpes2zh65dt5mtasx4pa2cp2m

A stealth monitoring mechanism for cyber-physical systems

Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões
2019 International Journal of Critical Infrastructure Protection  
Supervisory Control and Data Acquisition (SCADA) systems, which are often used in several types of Essential Systems and Critical Infrastructures, depend on control devices such as Programmable Logic Controllers  ...  observation of both physical inputs/outputs (i.e. the physical processes under control) and network communication flows -allowing the exploitation of various novel monitoring approaches able to address  ...  The attack included: (i) accessing the control SCADA network; (ii) reconfiguration of the pump stations software; (iii) DoS attacks 300 of radio communications; (iv) lockup of computer communications without  ... 
doi:10.1016/j.ijcip.2018.10.006 fatcat:qw27k7lgfrdsvc6g5la3qwsg4q

Behavior Based Anomaly Detection Model in SCADA System

Xiaojun Zhou, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, Wei Zhang, J. Heled, A. Yuan
2018 MATEC Web of Conferences  
Experiments show that using our proposed detection model, we can quickly detect a variety of attacks on SCADA (Supervisory Control And Data Acquisition) systems.  ...  After a large number of attack cases analysis, we found that attacks in SCADA systems can be divided into internal attacks and external attacks. Both types of attacks are inevitable.  ...  This work was supported by Security Services for Informatization Applications Program, Institute of Information Engineering, Chinese Academy of Sciences, under grant No.  ... 
doi:10.1051/matecconf/201817301011 fatcat:mhcc7zajxjaorhfa6bo6ygjnv4

iFinger: Intrusion Detection in Industrial Control Systems via Register-based Fingerprinting

Kai Yang, Qiang Li, Xiaodong Lin, Xin Chen, Limin Sun
2020 IEEE Journal on Selected Areas in Communications  
To discover the ICS attacks, we propose two detection approaches based on device fingerprints, including passive and active detection.  ...  We take advantage of an important insight that industrial protocol packets include register status values that are used to reflect the physical characteristics of ICS controllers.  ...  ICS Protocol ICS devices communicate with SCADA systems through a variety of industrial protocols in the application layer [22] .  ... 
doi:10.1109/jsac.2020.2980921 fatcat:kgn3tsi64nf4tlxwuai5dpzttq

Providing Situational Awareness for Pipeline Control Operations [chapter]

Jonathan Butts, Hugo Kleinhans, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi
2009 IFIP Advances in Information and Communication Technology  
The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity.  ...  A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment.  ...  Department of Homeland Security.  ... 
doi:10.1007/978-3-642-04798-5_7 fatcat:6igif6tgbbcnrkyzanh7fd3ezi

A Review of Research Work on Network-Based SCADA Intrusion Detection Systems

Slavica V. Bostjancic Rakas, Mirjana D. Stojanovic, Jasna D. Markovic-Petrovic
2020 IEEE Access  
To achieve these objectives, we start from the factors that impact the design of dedicated intrusion detection systems in SCADA networks and focus on network-based IDS solutions.  ...  Based on that, we provide a brief description and evaluation of 26 selected research papers, published in the period 2015-2019.  ...  , and inference attack.  ... 
doi:10.1109/access.2020.2994961 fatcat:pid6aq5t7be7hkf4moaym2wqti

INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER

2019 Issues in Information Systems  
upon different devices and communication protocols than other layers of the system.  ...  Regardless of one's technical knowledge, recognition of the potentially-catastrophic consequences of successful exploitation of those vulnerabilities necessitate at least some familiarity with security  ...  In this type of attack, the attacker electronically eavesdrops on IIoT system communications, perpetrating a privacy breach, as a result of which private and confidential information can be inferred on  ... 
doi:10.48009/1_iis_2019_119-133 fatcat:6beomruswrf3thwzbvrkb7cxny

Ensuring a Secure and Resilient Smart Grid: Cyber-Attacks and Countermeasures [article]

Charalambos Konstantinou
2015 arXiv   pre-print
This paper surveys the latest on Smart Grid security. It focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber-attacks.  ...  Particularly, on SCADA control centers in the top layer, on community gateways in the middle layer and on smart meters in the bottom layer.  ...  It does not infer trust by itself, but requires the establishment of a trust base, on which PKI can rely.  ... 
arXiv:1502.00237v2 fatcat:qcltyph5enhlxlbslbn7xftiea

Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range

Tiago Cruz, Paulo Simões
2021 Applied Sciences  
, within the scope of a course on cyber-physical systems security.  ...  In this perspective, hands-on exercises and contact with high-fidelity environments play a vital part in fostering interest and promoting a rewarding learning experience.  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/app11209509 fatcat:vbt5o7l7wrgvxcs4fkipixhbg4

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems [chapter]

Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens
2017 Lecture Notes in Computer Science  
It has a two-level detection architecture and is based on a formal description of node's normal behavior.  ...  The increasing use of wireless sensors networks in Supervisory Control and Data Acquisition systems (SCADA) raises the need of enforcing the security of this promising technology.  ...  This IDS focuses on attacks against routing protocols and detects only two kinds of attacks i.e., sinkhole and sleep deprivation attacks. Shin et al.  ... 
doi:10.1007/978-3-319-72598-7_24 fatcat:4rwpxvny2zchdo7klxp62ymife

Cyber security in the Smart Grid: Survey and challenges

Wenye Wang, Zhuo Lu
2013 Computer Networks  
Specifically, we focus on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid.  ...  Thus, we present discussions on existing cyber security solutions, as well as open research issues, in combination with communication architectures and protocols in the context of realtime and non-real  ...  For example, a recent study investigated the impact of a buffer-flooding attack on the DNP3-based SCADA network with real SCADA system hardware and software, and showed that current SCADA system is quite  ... 
doi:10.1016/j.comnet.2012.12.017 fatcat:ow4rerhh4bcijjmto2zbqcbcky

Analysis of Intrusion Detection Systems in Industrial Ecosystems

Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
For an effective protection of all the elements of an industrial ecosystem against threats, it is necessary to understand the true scope of existing mechanisms capable of detecting potential anomalies  ...  It is the aim of this article to review the threats that affect existing and novel elements of this ecosystem; and to analyze the state, evolution and applicability of both academic and industrial intrusion  ...  These works focus mostly on two strategies: i) defining and detecting attack signatures, and ii) analyzing the behavior of these communication protocols with the detection mechanisms described in section  ... 
doi:10.5220/0006426301160128 dblp:conf/secrypt/RubioARL17 fatcat:qj7iaepf7ffdfparlncgcydc4m

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks [article]

Ahsan Al Zaki Khan, Gursel Serpen
2020 arXiv   pre-print
types of attacks against industrial SCADA networks.  ...  The machine learning classifier is trained and tested on the data generated using the laboratory prototype of a gas pipeline SCADA network.  ...  SCADA networks for industrial infrastructure employ networking protocols to facilitate communication for command and control.  ... 
arXiv:2012.09707v1 fatcat:u6inte6f4jdarocmub775n4ery
« Previous Showing results 1 — 15 out of 343 results