2009
DOI: 10.1016/j.ijcip.2009.10.001
|View full text |Cite
|
Sign up to set email alerts
|

An experimental investigation of malware attacks on SCADA systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(39 citation statements)
references
References 16 publications
0
36
0
Order By: Relevance
“…Identifying the attack vector that could compromise the system to enable such a scenario is not the main focus of this study. However, the Stuxnet worm together with other studies such as the one performed by Nai Fovino, et al [11] showed that such scenarios are possible in real settings. For instance, corporate firewalls could be compromised by infected user stations within the corporate network.…”
Section: Adversary Model and Attack Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…Identifying the attack vector that could compromise the system to enable such a scenario is not the main focus of this study. However, the Stuxnet worm together with other studies such as the one performed by Nai Fovino, et al [11] showed that such scenarios are possible in real settings. For instance, corporate firewalls could be compromised by infected user stations within the corporate network.…”
Section: Adversary Model and Attack Scenariomentioning
confidence: 99%
“…In the past CIs were isolated environments and used proprietary hardware and protocols, limiting thus the threats that could affect them. Nowadays CIs, or more specifically Networked Industrial Control Systems (NICS), are exposed to significant cyber-threats; a fact that has been highlighted by many studies on the security of Supervisory Control And Data Acquisition (SCADA) systems [7,11]. The recently reported Stuxnet worm [8] is the first malware specifically designed to attack NICS.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, CIs or more accurately Distributed Control Systems (DCS) are exposed to significant cyber-threats; a fact that has been highlighted by many studies on the security of Supervisory Control And Data Acquisition (SCADA) systems [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…It is forecasted that IP-based networks with IPv6 and Supervisory Control And Data Acquisition (SCADA) [1] will provide the communications architecture for substation and distribution automation, advanced metering and home area networking applications for the future Smart Grid [2]. This will lead to many challenging issues in the security of Smart Grid as current SCADA systems are exposed to significant cyber-threats; a fact that has been highlighted by many studies [3], [4]. For example, the recently discovered Stuxnet worm [5] is the first malware that is specifically designed to attack SCADA systems.…”
Section: Introductionmentioning
confidence: 99%