Insecure by Design: Using Human Interface Devices to exploit SCADA systems
نویسندگان
چکیده
Modern Supervisory Control and Data Acquisition (SCADA) systems which are used by the electric utility industry to monitor and control electric power generation, transmission and distribution, are recognized today as critical components of the electric power delivery infrastructure. SCADA systems are large, complex and incorporate increasingly large numbers of widely distributed components. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms.
منابع مشابه
Integrated SCADA / DMS / OMS : Increasing Distribution Operations Efficiency
March-April 2009 Issue I SCADA SCADA systems are globally accepted as a means of real-time monitoring and control of electric power systems, particularly generation and transmission systems. RTUs (Remote Terminal Units) are used to collect analog and status telemetry data from field devices, as well as communicate control commands to the field devices. Installed at a centralized location, such ...
متن کاملExploiting SCADA vulnerabilities using a Human Interface Device
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/tech...
متن کاملDesign and Development of Layered Security: Future Enhancements and Directions in Transmission
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open pr...
متن کاملVirtual SCADA Systems for Cyber Security
This paper describes a pair of virtual Supervisory Control and Data Acquisition (SCADA) systems. These virtual simulations were built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, utilize control system communication protocols, and implement industrial Human Machine Interfaces (HMI). The first of these focuses on a comprehensive vir...
متن کاملComparison of Different Linear Filter Design Methods for Handling Ocular Artifacts in Brain Computer Interface System
Brain-computer interfaces (BCI) record brain signals, analyze and translate them into control commands which are relayed to output devices that carry out desired actions. These systems do not use normal neuromuscular output pathways. Actually, the principal goal of BCI systems is to provide better life style for physically-challenged people which are suffered from cerebral palsy, amyotrophic l...
متن کامل