Title
Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks
Abstract
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
Year
DOI
Venue
2014
10.14236/ewic/ics-csr2014.5
ICS-CSR
Field
DocType
Citations 
Man-in-the-middle attack,IEC 60870-5,Computer security,Electric power distribution,Testbed,Software,SCADA,Engineering,Replay attack
Conference
10
PageRank 
References 
Authors
1.06
6
3
Name
Order
Citations
PageRank
Peter Maynard1101.06
Kieran McLaughlin220822.19
Berthold Haberler3101.06