SCADA communication protocols: vulnerabilities, attacks and possible mitigations

被引:0
|
作者
Durga Samanth Pidikiti
Rajesh Kalluri
R. K. Senthil Kumar
B. S. Bindhumadhava
机构
[1] Centre for Development of Advanced Computing,Real Time Systems and Smart Grid Group
关键词
SCADA; MTU; RTU; Risk analysis; HMI;
D O I
10.1007/s40012-013-0013-5
中图分类号
学科分类号
摘要
Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to cripple down the SCADA systems completely coordinated communication channel attacks can be performed. IEC 60870-5-101 and IEC 60870-5-104 protocols are widely used in current SCADA systems in power utilities sector. These protocols are lacking in the application layer and the data link layer security. Application layer security is necessary to protect the SCADA systems from Spoofing and Non-Repudiation attacks. Data link layer security is necessary to protect the systems from the Sniffing, Data modification and Replay attacks. IEC 60870-5-101 & 104 communication protocol vulnerabilities and their exploitation by coordinated attacks are explained in this paper. Proposed experimental research model can be used to mitigate the attacks at application layer and data link layer by adopting the IEC 62351 standards.
引用
收藏
页码:135 / 141
页数:6
相关论文
共 50 条
  • [21] ATTACKS TO CRYPTOGRAPHY PROTOCOLS OF WIRELESS INDUSTRIAL COMMUNICATION SYSTEMS
    Ondrasina, Tomas
    Franekova, Maria
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 8 (03) : 78 - 83
  • [22] Assessing cyber attacks on local electricity markets using simulation analysis: Impacts and possible mitigations
    Dedrick, Jason
    Perrin, Keli A.
    Sabaghian, Ehsan
    Wilcoxen, Peter J.
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2023, 34
  • [23] SCADA, RTU protocols
    Sheble, N
    Kalapatapu, R
    INTECH, 2005, 52 (04) : 63 - 63
  • [24] Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems
    Hadi, Hassan Jalil
    Cao, Yue
    Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022, 2022, : 213 - 218
  • [25] Exploring ICS/SCADA Network Vulnerabilities
    Strohmier, Hala
    Londhe, Aaryan R.
    Clark, Chris A.
    Pawar, Ronit
    Kram, Brian
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, PT II, HCI-CPT 2024, 2024, 14729 : 215 - 233
  • [26] SCADA Systems in South Africa and Their Vulnerabilities
    Chileshe, Grace
    van Heerden, Renier
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 90 - 97
  • [27] Stuxnet Vulnerabilities Analysis of SCADA Systems
    Wang, Yong
    Gu, Dawu
    Peng, DaoGang
    Chen, Shuai
    Yang, Heng
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 640 - +
  • [28] Vulnerabilities in SCADA and Critical Infrastructure Systems
    Robles, Rosslin John
    Choi, Min-kyu
    Cho, Eun-suk
    Kim, Seok-soo
    Park, Gil-cheol
    Yeo, Sang-Soo
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2008, 1 (01): : 99 - 104
  • [29] Localhost detour from public to private networks: Vulnerabilities and mitigations
    Israeli, Dor
    Noy, Alon
    Afek, Yehuda
    Bremler-Barr, Anat
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2024,
  • [30] Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols
    Hill, Zachary
    Hale, John
    Papa, Mauricio
    Hawrylak, Peter
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 82 - 88