TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
|
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [41] Ontology-based Detection of Cyber-Attacks to SCADA-Systems in critical Infrastructures
    Krauss, Daniel
    Thomalla, Christoph
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2016, : 70 - 73
  • [42] An electrical grid and its SCADA under cyber attacks Modelling versus a Hybrid Test Bed
    Ciancamerla, E.
    Fresilli, B.
    Minichino, M.
    Patriarca, T.
    Iassinovski, Serguei
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [43] Review of Cyber Attacks on Power System Operations
    Chatterjee, Kaustav
    Padmini, V.
    Khaparde, S. A.
    2017 IEEE REGION 10 INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR SMART CITIES (IEEE TENSYMP 2017), 2017,
  • [44] Investigation of Cyber Attacks on a Water Distribution System
    Adepu, Sridhar
    Palleti, Venkata Reddy
    Mishra, Gyanendra
    Mathur, Aditya
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 274 - 291
  • [45] A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems
    Stabili, Dario
    Romagnoli, Raffaele
    Marchetti, Mirco
    Sinopoli, Bruno
    Colajanni, Michele
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 144 : 151 - 164
  • [46] Architecture for Preventing and Detecting Cyber Attacks in Cyber-Manufacturing System
    Prasad, Romesh
    Moon, Young
    IFAC PAPERSONLINE, 2022, 55 (10): : 2246 - 2251
  • [47] On the reliability of a voting system under cyber attacks
    Li, Yijia
    Hu, Xiaoxiao
    Zhao, Peng
    Reliability Engineering and System Safety, 2021, 216
  • [48] On the reliability of a voting system under cyber attacks
    Li, Yijia
    Hu, Xiaoxiao
    Zhao, Peng
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 216
  • [49] A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks
    Choudhary, Atul S.
    Choudhary, Pankaj P.
    Salve, Shrikant
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 612 - 617
  • [50] Cyber Wargaming on SCADA Systems
    Colbert, Edward
    Sullivan, Daniel
    Kott, Alexander
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 96 - 104