Insecure by Design: Using Human Interface Devices to exploit SCADA systems

نویسندگان

  • Grigoris Tzokatziou
  • Leandros A. Maglaras
  • Helge Janicke
چکیده

Modern Supervisory Control and Data Acquisition (SCADA) systems which are used by the electric utility industry to monitor and control electric power generation, transmission and distribution, are recognized today as critical components of the electric power delivery infrastructure. SCADA systems are large, complex and incorporate increasingly large numbers of widely distributed components. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrated SCADA / DMS / OMS : Increasing Distribution Operations Efficiency

March-April 2009 Issue I SCADA SCADA systems are globally accepted as a means of real-time monitoring and control of electric power systems, particularly generation and transmission systems. RTUs (Remote Terminal Units) are used to collect analog and status telemetry data from field devices, as well as communicate control commands to the field devices. Installed at a centralized location, such ...

متن کامل

Exploiting SCADA vulnerabilities using a Human Interface Device

SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/tech...

متن کامل

Design and Development of Layered Security: Future Enhancements and Directions in Transmission

Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open pr...

متن کامل

Virtual SCADA Systems for Cyber Security

This paper describes a pair of virtual Supervisory Control and Data Acquisition (SCADA) systems. These virtual simulations were built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, utilize control system communication protocols, and implement industrial Human Machine Interfaces (HMI). The first of these focuses on a comprehensive vir...

متن کامل

Comparison of Different Linear Filter Design Methods for Handling Ocular Artifacts in Brain Computer Interface System

 Brain-computer interfaces (BCI) record brain signals, analyze and translate them into control commands which are relayed to output devices that carry out desired actions. These systems do not use normal neuromuscular output pathways. Actually, the principal goal of BCI systems is to provide better life style for physically-challenged people which are suffered from cerebral palsy, amyotrophic l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015