TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
|
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [21] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [22] False Logic Attacks on SCADA Control System
    Li, Weize
    Xie, Lun
    Liu, Daqian
    Wang, Zhiliang
    2014 ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC), 2014, : 136 - 140
  • [23] A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
    Agrafiotis, Ioannis
    Nurse, Jason R. C.
    Goldsmith, Michael
    Creese, Sadie
    Upton, David
    JOURNAL OF CYBERSECURITY, 2018, 4 (01):
  • [24] Cyber Attacks in Cyber-Physical Power Systems: A Case Study with GPRS-Based SCADA Systems
    Zhang, Taimin
    Wang, Yinan
    Liang, Xiao
    Zhuang, Zhou
    Xu, Wenyuan
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 6847 - 6852
  • [25] Towards a taxonomy of cyber threats against target applications
    Narwal, Bhawna
    Mohapatra, Amar Kumar
    Usmani, Kaleem Ahmed
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2019, 22 (02): : 301 - 325
  • [26] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510
  • [27] Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features
    Soe, Yan Naung
    Feng, Yaokai
    Santosa, Paulus Insap
    Hartanto, Rudy
    Sakurai, Kouichi
    ELECTRONICS, 2020, 9 (01)
  • [28] Secure SCADA Communication Network for Detecting and Preventing Cyber-Attacks on Power Systems
    Chalamasetty, Goutham K.
    Mandal, Paras
    Tseng, Tzu-Liang
    2016 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2016,
  • [29] Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems
    Woo, Pil Sung
    Kim, Balho H.
    Hur, Don
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2015, 10 (03) : 888 - 894
  • [30] Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks
    Ciancamerla, E.
    Minichino, M.
    Palmieri, S.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 123 - 134