An Initial Investigation into Attribution in SCADA Systems

نویسندگان

  • Andrew Nicholson
  • Helge Janicke
  • Tim Watson
چکیده

Supervisory control and Data Acquisition (SCADA) systems play a core role in a nation’s critical infrastructure, overseeing the monitoring and control of systems in electricity, gas supply, logistics services, banks and hospitals. SCADA systems were once separated from other networks and used proprietary communications protocols, hardware and software. Nowadays modern SCADA systems are increasingly directly or indirectly connected to the Internet, use standardised protocols and commercial-off-the-shelf hardware and software. Attacks on these systems have the potential for devastating consequences and attribution of attacks against SCADA systems presents new challenges. This paper investigates the use of techniques to attribute cyber attacks against SCADA systems. We investigate the use of five known technical attribution techniques in SCADA systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Petri-net Model for Operational Cycle in SCADA Systems

Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...

متن کامل

Investigating SCADA Failures in Interdependent Critical Infrastructure Systems

this paper is based on the initial ideas of a research proposal which will investigate SCADA failures in physical infrastructure systems. The results will be used to develop a new notation to help risk assessment using dependable computing concepts. SCADA systems are widely used within critical infrastructures to perform system controls and deliver services to linked and dependent systems. Fail...

متن کامل

Toward Survivable Intrusion-Tolerant Open-Source SCADA

As vital components of critical infrastructure, SCADA systems must continue to operate correctly and at their expected level of performance at all times. However, current SCADA systems are vulnerable to intrusions, and even a single compromise can cause catastrophic consequences. We present the architecture of and initial steps toward the first intrusion-tolerant open-source SCADA system that i...

متن کامل

Adapting Bro into SCADA: Building Specification-based Intrusion Detection System for DNP3 Protocol

Modern SCADA systems are increasingly adopting Internet technology to control industry processes. With their security vulnerabilities exposed to public networks, an attacker is able to penetrate into these control systems to put remote facilities in danger. To detect such attacks, SCADA systems require an intrusion detection technique that can monitor network traffic based on proprietary networ...

متن کامل

Integrating Remotely Located Substations Into SCADA Systems: A Case Study Using Commercially Available Satellite Internet Service Providers for SCADA Communications

This paper presents observations and analysis experienced by a utility end user. As SCADA systems become a crucial part of daily operations for utilities, finding low-cost, reliable communications for substations in remote geographic locations often presents a challenge. Current SCADA communications methods, including framerelay, T1, and fiber are often unreasonably expensive, in terms of insta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013