Security considerations in DNP3 SCADA systems

被引:0
|
作者
Patel, SC [1 ]
Graham, JH [1 ]
机构
[1] Univ Louisville, Dept Comp Engn & Comp Sci, Louisville, KY 40292 USA
关键词
control systems; computer networks; computer security; SCADA; DNP3;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Supervisory Control and Data Acquisition (SCADA) networks are used by many utility companies that form critical infrastructure. SCADA networks can be easy targets for unauthorized intrusions that can result in devastating attacks by terrorists. This research identifies threats faced by SCADA and investigates effective methods to enhance security of DNP3 protocols, which are widely used for SCADA implementations. We propose implementation alternatives including SSL/TLS, IPsec, object security, encryption, and message authentication object. The paper analyzes and compares these approaches. In addition, it also evaluates implementation details of these solutions, which can be in the form of an open source toolkits or necessary changes to DNP3. Finally, we provide new research directions to more adequately secure SCADA and DNP3.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [41] Securing Networked Microgrids Operation through DNP3 Protocol Implementation
    Soliman, Ahmed S.
    Saad, Ahmed A.
    Mohammed, Osama
    2021 IEEE INDUSTRY APPLICATIONS SOCIETY ANNUAL MEETING (IAS), 2021,
  • [42] Designing Snort Rules to Detect Abnormal DNP3 Network Data
    Li, Hao
    Liu, Guangjie
    Jiang, Weiwei
    Dai, Yuewei
    FOURTH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (CCAIS 2015), 2015, : 343 - 348
  • [43] A Network Protection Framework for DNP3 Over TCP/IP Protocol
    Bai, Jin
    Hariri, Salim
    Al-Nashif, Youssif
    2014 IEEE/ACS 11TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2014, : 9 - 15
  • [44] Recovery Measure against Disabling Reassembly Attack to DNP3 Communication
    Kwon, Sungmoon
    Yoo, Hyunguk
    Shon, Taeshik
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08): : 1790 - 1797
  • [45] SoK: A Reality Check for DNP3 Attacks 15 Years Later
    Rodriguez, Juan David Parra
    Boakye-Boateng, Kwasi
    Kaur, Ratinder
    Zhou, Allyson
    Lu, Rongxing
    Ghorbani, Ali A.
    SMART CITIES, 2024, 7 (06): : 3983 - 4001
  • [46] Design and Performance of a Split Protocol Architecture on Distributed Network Protocol 3 (DNP3)
    Richard, Anand
    Appiah-Kubi, Patrick
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 249 - 253
  • [47] Secure authentication in the grid: A formal analysis of DNP3 SAv5
    Cremers, Cas
    Dehnel-Wild, Martin
    Milner, Kevin
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (02) : 203 - 232
  • [48] Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms
    de Toledo, Thais
    Torrisi, Nunzio
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2019, 1 (01): : 384 - 399
  • [49] Implementing Distributed Intelligence by Utilizing DNP3 protocol for distribution automation application
    Pham, Bryan
    Huff, Christopher
    Vendittis, P. E. Nick
    Smit, Andre
    Stinskiy, Alexandr
    Chanda, Suraj
    2018 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2018,
  • [50] Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
    Cremers, Cas
    Dehnel-Wild, Martin
    Milner, Kevin
    COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 389 - 407