Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System

被引:3
|
作者
Oh, Sangkyo [1 ]
Chung, Hyunji [1 ]
Lee, Sangjin [1 ]
Lee, Kyungho [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul, South Korea
关键词
SCADA system; PROFINET DCP; Authentication;
D O I
10.14257/ijsia.2014.8.2.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. If a SCADA system is infected by a malicious worm, such as the Stuxnet, disaster is inevitable. Since the appearance of Stuxnet, researchers focused on detecting this intrusion in SCADA networks. As a result, various methods have been presented by researchers. One of them is to monitor traffic and detect anomalous patterns. However, it is not able to detecting a spoofed packet. This study present three cases of system anomaly by example of pattern based on real data of PROFINET/DCP protocol. And propose protection method using the authentication.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [2] Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment
    Song, In-A
    Lee, Young-Seok
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 408 - 413
  • [3] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack
    Arzaki, Muhammad
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
  • [4] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [5] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [6] Man-in-the-middle Attack on BB84 Protocol and its Defence
    Wang Yong
    Wang Huadeng
    Li Zhaohong
    Huang Jinxiang
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
  • [7] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [8] Secure Smartphone-Based NFC Payment to Prevent Man-in-the-Middle Attack
    Anggoro, Oldyson
    Dzulfikar, Muhammad
    Purwandari, Betty
    Mishbah, Muhammad
    [J]. 2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS), 2019, : 109 - 114
  • [9] On Man-in-the-Middle Attack Risks of the VPN Gate Relay System
    Sun, Yunxiao
    Wang, Bailing
    Wang, Chao
    Wei, Yuliang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack
    Chowdhury, Abhijit
    Nath, Shubhajit
    Howlader, Jaydeep
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280