Scientific Literature Review for the Search of Vulnerabilities and Pentesting Tools for SCADA System

被引:0
|
作者
Vasquez, Eduardo [1 ]
Castrillon, Helder [1 ,2 ]
机构
[1] Univ Mayor, Manuel Montt 367, Providencia, Chile
[2] Corp Univ Comfacauca, Cl 4 8-30, Popayan, Colombia
来源
关键词
Vulnerability; Framework; SCADA; ICS; Tools; Pentesting;
D O I
10.1007/978-3-030-89586-0_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information and communication technologies (ICT) have contributed to change the way of doing things in practically all industries and markets worldwide. They make it possible to optimize processes, automate them and have a precise level of control in real time. One of the areas that has evolved and made use of these technologies is industrial control systems (ICS), specifically Supervisory Control And Data Acquisition (SCADA) systems. Using modern ICTs in turn entails embracing both their benefits and associated risks. It is important to know the vulnerabilities that affect these technologies and to analyze in detail those that could directly or indirectly affect and compromise the systems that depend on them. The objective of this systematic review is to identify, analyze and evaluate the published research on ICT vulnerabilities associated with SCADA systems, as well as the methods, methodologies, tools, among others, that can be used for their exploitation and thus to know the current scenario, allowing corrective measures to be taken.
引用
收藏
页码:90 / 103
页数:14
相关论文
共 50 条
  • [1] Assessment of SCADA System Vulnerabilities
    Yadav, Geeta
    Paul, Kolin
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1737 - 1744
  • [2] SCADA system vulnerabilities ... response
    Flannigan, Stephen
    CONTROL ENGINEERING, 2008, 55 (10) : 13 - 13
  • [3] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [4] A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology
    Zaazaa, Oualid
    El Bakkali, Hanan
    JOURNAL OF INTELLIGENT SYSTEMS, 2023, 32 (01)
  • [5] PULP: A System for Exploratory Search of Scientific Literature
    Medlar, Alan
    Ilves, Kalle
    Wang, Ping
    Buntine, Wray
    Glowacka, Dorota
    SIGIR'16: PROCEEDINGS OF THE 39TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2016, : 1133 - 1136
  • [6] Analyzing vulnerabilities between SCADA system and SUC due to interdependencies
    Nan, Cen
    Eusgeld, Irene
    Kroeger, Wolfgang
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2013, 113 : 76 - 93
  • [7] Assessing Scientific Inquiry: A Systematic Literature Review of Tasks, Tools and Techniques
    Vo, De Van
    Simmie, Geraldine Mooney
    INTERNATIONAL JOURNAL OF SCIENCE AND MATHEMATICS EDUCATION, 2025, 23 (04) : 871 - 906
  • [8] SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues
    Alanazi, Manar
    Mahmood, Abdun
    Chowdhury, Mohammad Jabed Morshed
    COMPUTERS & SECURITY, 2023, 125
  • [9] Tools for the Implementation of a SCADA System in a Desalination Process
    Nunez Alvarez, Jose Ricardo
    Benitez Pina, Israel Francisco
    Rodriguez Martinez, Alberto
    Diaz Perez, Sergio
    Luiz de Oliveira, Djonathan
    IEEE LATIN AMERICA TRANSACTIONS, 2019, 17 (11) : 1858 - 1864
  • [10] Federated search of scientific literature
    Schatz, B
    Mischo, W
    Cole, T
    Bishop, A
    Harum, S
    Johnson, E
    Neumann, L
    Chen, HC
    Ng, D
    COMPUTER, 1999, 32 (02) : 51 - +