SCADA communication protocols: vulnerabilities, attacks and possible mitigations

被引:0
|
作者
Durga Samanth Pidikiti
Rajesh Kalluri
R. K. Senthil Kumar
B. S. Bindhumadhava
机构
[1] Centre for Development of Advanced Computing,Real Time Systems and Smart Grid Group
关键词
SCADA; MTU; RTU; Risk analysis; HMI;
D O I
10.1007/s40012-013-0013-5
中图分类号
学科分类号
摘要
Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to cripple down the SCADA systems completely coordinated communication channel attacks can be performed. IEC 60870-5-101 and IEC 60870-5-104 protocols are widely used in current SCADA systems in power utilities sector. These protocols are lacking in the application layer and the data link layer security. Application layer security is necessary to protect the SCADA systems from Spoofing and Non-Repudiation attacks. Data link layer security is necessary to protect the systems from the Sniffing, Data modification and Replay attacks. IEC 60870-5-101 & 104 communication protocol vulnerabilities and their exploitation by coordinated attacks are explained in this paper. Proposed experimental research model can be used to mitigate the attacks at application layer and data link layer by adopting the IEC 62351 standards.
引用
收藏
页码:135 / 141
页数:6
相关论文
共 50 条
  • [41] Digital vulnerabilities: dialogues and possible approaches with the Barberian theoretical contributions of communication
    Junqueira, Antonio Helio
    Botelho-Francisco, Rodrigo Eduardo
    Grieger, Jenifer Daiane
    CHASQUI-REVISTA LATINOAMERICANA DE COMUNICACION, 2021, (147): : 163 - 180
  • [42] Securing IoT systems in a post-quantum environment: Vulnerabilities, attacks, and possible solutions
    Alomari, Ahmad
    Kumar, Sathish A. P.
    INTERNET OF THINGS, 2024, 25
  • [43] Microarchitectural Attacks and Mitigations on Retire Resources in Modern Processors
    Xu, Ke
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    IEEE TRANSACTIONS ON COMPUTERS, 2025, 74 (04) : 1253 - 1266
  • [44] Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations
    Mambretti, Andrea
    Neugschwandtner, Matthias
    Sorniotti, Alessandro
    Kirda, Engin
    Robertson, William
    Kurmus, Anil
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 747 - 761
  • [45] Measuring the effectiveness of SDN mitigations against cyber attacks
    Koning, Ralph
    de Graaff, Ben
    Meijer, Robert
    de Laat, Cees
    Grosso, Paola
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [46] Vulnerabilities of reliable multicast protocols
    Parks, TM
    Kassay, DA
    Weinstein, CJ
    IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 934 - 938
  • [47] Technostress: negative effect on performance and possible mitigations
    Tarafdar, Monideepa
    Pullins, Ellen Bolman
    Ragu-Nathan, T. S.
    INFORMATION SYSTEMS JOURNAL, 2015, 25 (02) : 103 - 132
  • [48] Enterprise WLAN Security Flaws Current Attacks and relative Mitigations
    Abo-Soliman, Mohamed A.
    Azar, Marianne A.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [49] Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols
    Mayouf, Mabroka Ali
    Shukur, Zarina
    VISUAL INFORMATICS: BRIDGING RESEARCH AND PRACTICE, 2009, 5857 : 510 - 520
  • [50] Internal Security Attacks on SCADA Systems
    Sayegh, Naoum
    Chehab, Ali
    Elhajj, Imad H.
    Kayssi, Ayman
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 22 - 27