SCADA communication protocols: vulnerabilities, attacks and possible mitigations

被引:0
|
作者
Durga Samanth Pidikiti
Rajesh Kalluri
R. K. Senthil Kumar
B. S. Bindhumadhava
机构
[1] Centre for Development of Advanced Computing,Real Time Systems and Smart Grid Group
关键词
SCADA; MTU; RTU; Risk analysis; HMI;
D O I
10.1007/s40012-013-0013-5
中图分类号
学科分类号
摘要
Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to cripple down the SCADA systems completely coordinated communication channel attacks can be performed. IEC 60870-5-101 and IEC 60870-5-104 protocols are widely used in current SCADA systems in power utilities sector. These protocols are lacking in the application layer and the data link layer security. Application layer security is necessary to protect the SCADA systems from Spoofing and Non-Repudiation attacks. Data link layer security is necessary to protect the systems from the Sniffing, Data modification and Replay attacks. IEC 60870-5-101 & 104 communication protocol vulnerabilities and their exploitation by coordinated attacks are explained in this paper. Proposed experimental research model can be used to mitigate the attacks at application layer and data link layer by adopting the IEC 62351 standards.
引用
收藏
页码:135 / 141
页数:6
相关论文
共 50 条
  • [1] Passive Inference of Attacks on SCADA Communication Protocols
    Bou-Harb, Elias
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 62 - 67
  • [2] Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations
    Pu, Hongyi
    He, Liang
    Cheng, Peng
    Sun, Mingyang
    Chen, Jiming
    [J]. IEEE NETWORK, 2023, 37 (01): : 111 - 117
  • [3] Analysis of SCADA System Vulnerabilities to DDoS Attacks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    [J]. 2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 591 - 594
  • [4] Uncovering Industrial Control Systems Vulnerabilities by Examining SCADA Virtual Packages and Their Communication Protocols
    Seo, W. J.
    Sitnikova, E.
    [J]. 21ST INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION (MODSIM2015), 2015, : 725 - 731
  • [5] Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
    Zografopoulos, Ioannis
    Hatziargyriou, Nikos D.
    Konstantinou, Charalambos
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6695 - 6709
  • [6] Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
    Costin, Andrei
    [J]. TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 45 - 54
  • [7] Correctness proofs for SCADA communication protocols
    Graham, James H.
    Patel, Sandip C.
    [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 392 - 397
  • [8] Hardware Speculation Vulnerabilities and Mitigations
    Swearingen, Nathan
    Hosler, Ryan
    Zou, Xukai
    [J]. 2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021), 2021, : 609 - 614
  • [9] SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues
    Alanazi, Manar
    Mahmood, Abdun
    Chowdhury, Mohammad Jabed Morshed
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [10] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214