Abstract | ||
---|---|---|
Programmable Logic Controller (PLC) is an important component in modern Industrial Control Systems (ICS) particular in Supervisory Control and Data Acquisition (SCADA) systems. Disturbing the normal operation of PLCs can lead to significant damages ranging from minor annoyance to large scale incidents threatening the life of people. While most of existing work in the SCADA security literature focuses on the communication between PLCs and field devices, this paper presents a network security analysis of the communication between PLCs and the engineering stations in charge of setting up and configuring them. Interestingly, this aspect of SCADA security was exploited by the most famous SCADA attack, namely, Stuxnet. Using a testbed with a common PLC device, we successfully carried out three network attacks leading to serious compromise of typical PLCs. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.ijcip.2018.05.004 | International Journal of Critical Infrastructure Protection |
Keywords | Field | DocType |
Industrial Control Systems Security,SCADA Security | Damages,Computer security,Network security,Testbed,Industrial control system,Ranging,Programmable logic controller,Stuxnet,SCADA,Engineering | Journal |
Volume | ISSN | Citations |
22 | 1874-5482 | 2 |
PageRank | References | Authors |
0.42 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Asem Ghaleb | 1 | 2 | 0.75 |
sami zhioua | 2 | 72 | 13.00 |
Ahmad Almulhem | 3 | 11 | 2.03 |