Cyber Terror Attack Analysis for Industrial Control Systems (SCADA)

被引:1
|
作者
Sogut, Esra [1 ]
Erdem, O. Ayhan [1 ]
机构
[1] Gazi Univ, Bilgisayar Muhendisligi Bolumu, Teknol Fak, Ankara, Turkey
来源
关键词
Scada; ics; modbus; cyber terror; cyber attack;
D O I
10.2339/politeknik.562570
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Supervisory Control and Data Acquisition Systems or Industrial Control Systems are the systems that control the critical infrastructures that are considered important. Attacks against critical infrastructures are considered as cyber terror attacks. Continuity of the operation of these critical infrastructures and ensuring the security of these critical infrastructures against cyber terror attacks are great importance. In this study, a data set of the gas pipeline control system, which is one of the critical infrastructures, is used. In the data set, several attacks were performed in the categories such as command injection, reconnaissance and denial of service for Modbus protocol which is one of the existing SCADA protocols. In this way, it is aimed to investigate and evaluate the behaviors of attacked and non-attacked situations. In addition, it is aimed to detect the attack. For this purpose, data mining method has been used with various algorithms on the data set. According to the analysis results, the most accurate classification rate is provided by Random Tree algorithm. By analyzing the results of this algorithm, cyber terror attack behaviors were determined and thus, an important contribution was made to the field of cyber terror attacks. In order to ensure cyber security of Supervisory Control and Data Acquisition Systems or Industrial Control Systems, such studies need to be carried out further and new data sets should be produced and put into use.
引用
下载
收藏
页码:557 / 566
页数:10
相关论文
共 50 条
  • [21] Cyber Attack Scenario Generation Method for Improving the Efficient of Security Measures in Industrial Control Systems
    Ogura T.
    Fujita J.
    Matsumoto N.
    IEEJ Transactions on Electronics, Information and Systems, 2024, 144 (01) : 35 - 42
  • [22] Deep Federated Learning-Based Cyber-Attack Detection in Industrial Control Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [23] Process Discovery for Industrial Control System Cyber Attack Detection
    Myers, David
    Radke, Kenneth
    Suriadi, Suriadi
    Foo, Ernest
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 61 - 75
  • [24] A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis
    Abdo, H.
    Kaouk, M.
    Flaus, J. -M.
    Masse, F.
    COMPUTERS & SECURITY, 2018, 72 : 175 - 195
  • [25] Electronic attack on IT and SCADA systems
    Davis, Peter
    Water Contamination Emergencies: Enhancing Our Response, 2006, (302): : 236 - 239
  • [26] Security Issues in SCADA based Industrial Control Systems
    Babu, Bijoy
    Ijyas, Thafasal
    Muneer, P.
    Varghese, Justin
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 47 - 51
  • [27] CYBER RESILIENCE ANALYSIS OF SCADA SYSTEMS IN NUCLEAR POWER PLANTS
    Galiardi, Meghan
    Gonzales, Amanda
    Thorpe, Jamie
    Vugrin, Eric
    Fasano, Raymond
    Lamb, Christopher
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING (ICONE2020), VOL 2, 2020,
  • [28] An Evaluation of Cyber Threats to Industrial Control Systems
    Vavra, Jan
    Hromada, Martin
    INTERNATIONAL CONFERENCE ON MILITARY TECHNOLOGIES (ICMT 2015), 2015, : 369 - 373
  • [29] Cyber Security Provision for Industrial Control Systems
    Amanowicz, Marek
    Jarmakiewicz, Jacek
    TRENDS IN ADVANCED INTELLIGENT CONTROL, OPTIMIZATION AND AUTOMATION, 2017, 577 : 611 - 620
  • [30] Industrial Control Systems: Cyber Policies and Strategies
    Gosine, Anil
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2020, 112 (06): : 48 - 54