Software Vulnerability Design and Approaches for Securing SCADA Control Systems
نویسندگان
چکیده
Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. Where security has been a consideration, there has been no clear methodology to assess the security impacts brought about by attacks. Worst, there have been no or very little security tools that have been released publicly. This research aims to addresses the issues regarding security and vulnerability testing. Software program was created to simulate the vulnerability testing and carry out assessment methodologies to test existing SCADA software design and implementation. This paper also describes the application of a well know security testing approach known as the software implemented fault injection as well as building the model for security vulnerabilities identification and analysis. Impact analysis was also performed to provide a better understanding of the attacks. Sufficient security measures are needed to block all possible intrusion points into the SCADA system to significantly reduce the chances of a successful attack.
منابع مشابه
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. The emergence of Internet and World Wide Web...
متن کاملSCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA plays a vital role in critical infrastructures. As the modern IT technology become very advanced, the threat on industrial control system (ICS) and SCADA security become a big concern of every critical infrastructures operator. With the recent cyber-attacks, the urge to secure the critical infrastructure is a big issue especially for those countries that uses critical infrastructures. In ...
متن کاملTowards a Distributed Runtime Monitor for ICS/SCADA Systems
Industrial Control Systems (ICS) and SCADA (Supervisory Control and Data Acquisition) systems are typically used in industries such as electricity generation and supply, gas supply, logistics, manufacturing and hospitals and are considered critical national infrastructure. The evolution of these systems from isolated environments into internet connected ones, in combination with their long serv...
متن کاملUtilization of different Encryption Schemes for Securing SCADA Component Communication
This dissertation is a study on the comparison of different Encryption Schemes for Securing SCADA Component Communication. SCADA Communication is a core component of a SCADA Monitoring System. SCADA (Supervisory Control and Data Acquisition) communication can take place in a number of ways. Early SCADA communication took place over radio, modem, or dedicated serial lines. Today, it is much more...
متن کاملEnhance Security Mechanism for Securing SCADA Wireless Sensor Network
Supervisory Control and Data Acquisition (SCADA) systems are vital components of most nation’s critical infrastructures. SCADA systems are primarily control systems. They control pipelines, water and transportation systems, utilities, refineries, chemical plants, and a wide variety of manufacturing operations. Sensor networks are becoming increasingly important in various applications such as m...
متن کامل