Analysis of SCADA System Vulnerabilities to DDoS Attacks

被引:0
|
作者
Markovic-Petrovic, Jasna D. [1 ]
Stojanovic, Mirjana D. [2 ]
机构
[1] CE Djerdap HPP Ltd, Kralj Marka 2, Negotin, Serbia
[2] Univ Belgrade, Fac Transport & Traff Engn, Belgrade, Serbia
关键词
Network security; Distributed Denial of Service; SCADA; Simulation; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.
引用
收藏
页码:591 / 594
页数:4
相关论文
共 50 条
  • [1] Securing the SCADA System from DDOS Attacks Identifying Using A Decision Tree
    Srivastava, Animesh
    Nidhi
    Shrivastava, Vivek
    Bhatnagar, Vivek
    Garg, Navin
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [2] Assessment of SCADA System Vulnerabilities
    Yadav, Geeta
    Paul, Kolin
    [J]. 2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1737 - 1744
  • [3] SCADA communication protocols: vulnerabilities, attacks and possible mitigations
    Durga Samanth Pidikiti
    Rajesh Kalluri
    R. K. Senthil Kumar
    B. S. Bindhumadhava
    [J]. CSI Transactions on ICT, 2013, 1 (2) : 135 - 141
  • [4] SCADA system vulnerabilities ... response
    Flannigan, Stephen
    [J]. CONTROL ENGINEERING, 2008, 55 (10) : 13 - 13
  • [5] Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks
    Watkins, Lanier
    Silberberg, Kurt
    Morales, Jose Andre
    Robinson, William H.
    [J]. 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), 2015, : 3 - 10
  • [6] Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach
    Yang, Yu-Sheng
    Lee, Shih-Hsiung
    Chen, Wei-Che
    Yang, Chu-Sing
    Huang, Yuen-Min
    Hou, Ting-Wei
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [7] Stuxnet Vulnerabilities Analysis of SCADA Systems
    Wang, Yong
    Gu, Dawu
    Peng, DaoGang
    Chen, Shuai
    Yang, Heng
    [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 640 - +
  • [8] SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues
    Alanazi, Manar
    Mahmood, Abdun
    Chowdhury, Mohammad Jabed Morshed
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [9] A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems
    Sogut, Esra
    Erdem, O. Ayhan
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [10] PISA*: A System for Control of DDoS Attacks
    Chhabra, Parminder
    Das, Sajal K.
    John, Ajita
    Zhang, Wei
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2171 - 2176