Security Assessment Framework for Cyber Physical Systems: A Case-study of DNP3 Protocol

被引:0
|
作者
Siddavatam, Irfan A. [1 ]
Kazi, Faruk [1 ]
机构
[1] Veermata Jijabai Technol Inst, Dept Elect Engn, Bombay 400019, Maharashtra, India
关键词
DNP3; Network security; SCADA protocols; SCADA system;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Industrial control system (ICS) is a critical component in realizing Cyber physical system (CPS). ICS designed with traditional SCADA platforms have a small percentage or no native security, since they were never designed to be operated remotely and over the Internet. Security of these critical systems relies heavily on communication protocols. DNP3 is one of the most widely used protocols by SCADA system to communicate between the master and slave station. IEEE 1815-2012 is the current standard for DNP3 having goal to provide cyber security based on IEC/TS 62351-15. This paper investigates the buoyancy of DNP3 towards attacks as passive Network reconnaissance, Base line response replay, Rogue interloper, Event buffer flooding and TCP veto. Paper concludes by comments on new set of Improper input validation vulnerability.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] DNPSec: Distributed Network Protocol Version 3 (DNP3) security framework
    Majdalawieh, Munir
    Parisi-Presicce, Francesco
    Wijesekera, Duminda
    ADVANCES IN COMPUTER, INFORMATION, AND SYSTEMS SCIENCES AND ENGINEERING, 2006, : 227 - +
  • [2] Security considerations in DNP3 SCADA systems
    Patel, SC
    Graham, JH
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2004, : 73 - 78
  • [3] Mitigating Common Cyber Vulnerabilities in DNP3 with Transport Layer Security
    Holguin, Ismael
    Errapotu, Sai Mounika
    2023 NORTH AMERICAN POWER SYMPOSIUM, NAPS, 2023,
  • [4] SCADA security: a review and enhancement for DNP3 based systems
    Peeyush Jain
    Paritosh Tripathi
    CSI Transactions on ICT, 2013, 1 (4) : 301 - 308
  • [5] A Network Protection Framework for DNP3 Over TCP/IP Protocol
    Bai, Jin
    Hariri, Salim
    Al-Nashif, Youssif
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 9 - 15
  • [6] Risk Assessment Method for Cyber Security of Cyber Physical Systems
    Wu, Wenbo
    Kang, Rui
    Li, Zi
    PROCEEDINGS OF THE 2015 FIRST INTERNATIONAL CONFERENCE ON RELIABILITY SYSTEMS ENGINEERING 2015 ICRSE, 2015,
  • [7] A Case-Study on American Perspectives on Cyber and Security
    Jantunen, Saara
    Huhtinen, Aki-Mauri
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 163 - 171
  • [8] A new enhanced cyber security framework for medical cyber physical systems
    Priyadarshini, Ishaani
    Kumar, Raghvendra
    Tuan, Le Minh
    Son, Le Hoang
    Long, Hoang Viet
    Sharma, Rohit
    Rai, Sakshi
    SICS SOFTWARE-INTENSIVE CYBER-PHYSICAL SYSTEMS, 2021, 35 (3-4): : 159 - 183
  • [9] Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems
    Riyadi, Eko Hadiyono
    Putra, Agfianto Eko
    Priyambodo, Tri Kuntoro
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 28
  • [10] Security Analysis of the Non-Aggressive Challenge Response of the DNP3 Protocol using a CPN Model
    Amoah, Raphael
    Suriadi, Suriadi
    Camtepe, Seyit
    Foo, Ernest
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 827 - 833