Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)

被引:1
|
作者
Sogut, Esra [1 ]
Erdem, O. Ayhan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi Bolumu, Teknol Fak, Ankara, Turkey
来源
关键词
Scada; ics; modbus; cyber terror; cyber attack;
D O I
10.2339/politeknik.562570
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Supervisory Control and Data Acquisition Systems or Industrial Control Systems are the systems that control the critical infrastructures that are considered important. Attacks against critical infrastructures are considered as cyber terror attacks. Continuity of the operation of these critical infrastructures and ensuring the security of these critical infrastructures against cyber terror attacks are great importance. In this study, a data set of the gas pipeline control system, which is one of the critical infrastructures, is used. In the data set, several attacks were performed in the categories such as command injection, reconnaissance and denial of service for Modbus protocol which is one of the existing SCADA protocols. In this way, it is aimed to investigate and evaluate the behaviors of attacked and non-attacked situations. In addition, it is aimed to detect the attack. For this purpose, data mining method has been used with various algorithms on the data set. According to the analysis results, the most accurate classification rate is provided by Random Tree algorithm. By analyzing the results of this algorithm, cyber terror attack behaviors were determined and thus, an important contribution was made to the field of cyber terror attacks. In order to ensure cyber security of Supervisory Control and Data Acquisition Systems or Industrial Control Systems, such studies need to be carried out further and new data sets should be produced and put into use.
引用
收藏
页码:557 / 566
页数:10
相关论文
共 50 条
  • [41] SCADA systems in the industrial automation
    Perez-Lopez, Esteban
    TECNOLOGIA EN MARCHA, 2015, 28 (04): : 3 - 14
  • [42] Cyber-attack-tolerant Frequency Control of Power Systems
    Chen, Chunyu
    Zhang, Kaifeng
    Ni, Ming
    Wang, Ying
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2021, 9 (02) : 307 - 315
  • [43] Here's what you need to know to protect SCADA systems from cyber-attack
    Rush, W.F., 1600, Oildom Publishing Co. of Texas Inc. (230):
  • [44] Dual redundant cyber-attack tolerant control systems strategy for cyber-physical systems
    Gamarra, Marco A.
    Shetty, Sachin
    Gonzalez, Oscar R.
    Njilla, Laurent
    Pendleton, Marcus
    Kamhoua, Charles
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [45] Covert Attack Detection and Secure Control for Cyber Physical Systems
    Wang, Xianghua
    Zolghadri, Ali
    IFAC PAPERSONLINE, 2023, 56 (02): : 7184 - 7189
  • [46] Cyber-attack-tolerant Frequency Control of Power Systems
    Chunyu Chen
    Kaifeng Zhang
    Ming Ni
    Ying Wang
    JournalofModernPowerSystemsandCleanEnergy, 2021, 9 (02) : 307 - 315
  • [47] A Novel Cyber Attack Detection Method in Networked Control Systems
    Mousavinejad, Eman
    Yang, Fuwen
    Han, Qing-Long
    Vlacic, Ljubo
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (11) : 3254 - 3264
  • [48] Towards a framework for cyber attack impact analysis of electric cyber physical systems
    Wang, Yinan
    Li, Wei
    Yan, Gangfeng
    Song, Sumian
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2017, : 638 - 643
  • [49] A survey of cyber security management in industrial control systems
    Knowles, William
    Prince, Daniel
    Hutchison, David
    Disso, Jules Ferdinand Pagna
    Jones, Kevin
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 9 : 52 - 80
  • [50] Adversarial Attacks in Industrial Control Cyber Physical Systems
    Figueroa, Henry
    Wang, Yi
    Giakos, George C.
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGING SYSTEMS AND TECHNIQUES (IST 2022), 2022,