TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM

被引:0
|
作者
Banga, Aashima [1 ]
Gupta, Deep A. [1 ]
Bathla, Ruchika [1 ]
机构
[1] Amity Univ, Amity Inst Informat Technol, Noida, Uttarpradesh, India
关键词
SCADA; RTU; IT SYSTEMS; CYBER THREATS; REAL-TIME SYSTEMS; DATABASES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 50 条
  • [31] TOWARDS A TAXONOMY OF ATTACKS AGAINST ENERGY CONTROL SYSTEMS
    Fleury, Terry
    Khurana, Himanshu
    Welch, Von
    CRITICAL INFRASTRUCTURE PROTECTION II, 2008, 290 : 71 - +
  • [32] Challenge and Evolution of Cyber Attacks in Cyber Physical Power System
    Tang, Yi
    Chen, Qian
    Li, Mengya
    Wang, Qi
    Ni, Ming
    Fu, XiangYun
    2016 IEEE PES ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2016, : 857 - 862
  • [33] Data Integrity Attacks and their Impacts on SCADA Control System
    Sridhar, Siddharth
    Manimaran, G.
    IEEE PES GENERAL MEETING, 2010,
  • [34] Petri Net Model of Insider Attacks in SCADA System
    Nasr, Payam Mahmoudi
    Varjani, Ali Yazdian
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 55 - 60
  • [35] Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks
    Maynard, Peter
    McLaughlin, Kieran
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 287 - 294
  • [36] A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids
    Reda, Haftu Tasew
    Anwar, Adnan
    Mahmood, Abdun Naser
    Tari, Zahir
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [37] Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries
    Radmand, Pedram
    Talevski, Alex
    Petersen, Stig
    Carlsen, Simon
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 949 - 957
  • [38] Cyber attacks real time detection: towards a Cyber Situational Awareness for naval systems
    Jacq, Olivier
    Brosset, David
    Kermarrec, Yvon
    Simonin, Jacques
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [39] Reliability Analysis of Power Grids with Cyber Vulnerability in SCADA System
    Zhang, Yichi
    Xiang, Yingmeng
    Wang, Lingfeng
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [40] Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
    Hernandez, Jarilyn M.
    Chen, Qian
    Calhoun, Chelsea
    Nichols, Jeffrey A.
    Sykes, Summer
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2915 - 2921