SCADA communication protocols: vulnerabilities, attacks and possible mitigations

被引:0
|
作者
Durga Samanth Pidikiti
Rajesh Kalluri
R. K. Senthil Kumar
B. S. Bindhumadhava
机构
[1] Centre for Development of Advanced Computing,Real Time Systems and Smart Grid Group
关键词
SCADA; MTU; RTU; Risk analysis; HMI;
D O I
10.1007/s40012-013-0013-5
中图分类号
学科分类号
摘要
Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to cripple down the SCADA systems completely coordinated communication channel attacks can be performed. IEC 60870-5-101 and IEC 60870-5-104 protocols are widely used in current SCADA systems in power utilities sector. These protocols are lacking in the application layer and the data link layer security. Application layer security is necessary to protect the SCADA systems from Spoofing and Non-Repudiation attacks. Data link layer security is necessary to protect the systems from the Sniffing, Data modification and Replay attacks. IEC 60870-5-101 & 104 communication protocol vulnerabilities and their exploitation by coordinated attacks are explained in this paper. Proposed experimental research model can be used to mitigate the attacks at application layer and data link layer by adopting the IEC 62351 standards.
引用
收藏
页码:135 / 141
页数:6
相关论文
共 50 条
  • [31] A Survey of Attacks and their Mitigations in Software Defined Networks
    Parashar, Manaswi
    Poonia, Amarjeet
    Satish, Kandukuru
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [32] Safety of the SCADA Systems in Power Systems by using Industry Protocols Data Communication
    Ejesh, Rejepova
    Zhang Zhonglin
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 1705 - 1708
  • [33] Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories
    Laghari, Shams Ul Arfeen
    Li, Wenhao
    Manickam, Selvakumar
    Nanda, Priyadarsi
    Al-Ani, Ayman Khallel
    Karuppayah, Shankar
    IEEE ACCESS, 2024, 12 : 139273 - 139289
  • [34] Quantum communication attacks on classical cryptographic protocols: (invited talk)
    Damgård, Ivan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
  • [35] Explicit communication revisited: Two new attacks on authentication protocols
    Abadi, M
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (03) : 185 - 186
  • [36] SoK: Workerounds - Categorizing Service Worker Attacks and Mitigations
    Subramani, Karthika
    Jueckstock, Jordan
    Kapravelos, Alexandros
    Perdisci, Roberto
    2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 555 - 571
  • [37] Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things
    Samtani, Sagar
    Yu, Shuo
    Zhu, Hongyi
    Patton, Mark
    Matherly, John
    Chen, Hsinchun
    IEEE INTELLIGENT SYSTEMS, 2018, 33 (02) : 63 - 73
  • [38] Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems
    Tsoutsos, Nektarios Georgios
    Maniatakos, Michail
    IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) : 95 - 98
  • [39] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [40] DNS Poisoning of Operating System Caches: Attacks and Mitigations
    Alharbi, Fatemah
    Zhou, Yuchen
    Qian, Feng
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2851 - 2863