2019 IEEE World Congress on Services (SERVICES) 2019
DOI: 10.1109/services.2019.00022
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 11 publications
1
21
0
Order By: Relevance
“…Researchers in [7] conduct experiments on attacking SCADA network, running IEC 104 protocol and the network is connected to the external heterogeneous network including IoT networks and find out holes for attacks. The researchers successfully perform IEC-104 flooding attack packet, TCP SYN DoS attack, unauthorized access, dan MiTM IEC 60870-5-104 isolation attack.…”
Section: Vulnerability Issues Of Scada Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers in [7] conduct experiments on attacking SCADA network, running IEC 104 protocol and the network is connected to the external heterogeneous network including IoT networks and find out holes for attacks. The researchers successfully perform IEC-104 flooding attack packet, TCP SYN DoS attack, unauthorized access, dan MiTM IEC 60870-5-104 isolation attack.…”
Section: Vulnerability Issues Of Scada Systemmentioning
confidence: 99%
“…The trends of supervisory control acquisition data security challenges in… (M. Agus Syamsul Arifin) 875 conducted by [1], [3], [4]. Researchers reveal security gaps in the SCADA system protocol itself that allow attackers to perform various attack scenarios on the SCADA system [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Many authors have investigated the security issues of IEC-104. In particular, in [2], the authors provided a risk assessment model regarding the IEC-104 communications, taking into account a Coloured Petri Net (CPN)-based threat assessment model as well as the risk assessment model of AlienVault OSSIM [3]. In [4]…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we focus on the Transmission Control Protocol (TCP)-based IEC 60870-5-104 (IEC-104) protocol, which is commonly utilised by Supervisory Control and Data Acquisition (SCADA) systems in Europe. IEC-104 uses the 2404 TCP port and does not include sufficient authorisation mechanisms, thus allowing potential cybercriminals to violate the IEC-104 communications either via unauthorised IEC-104 commands or Man in The Middle (MiTM) attacks [2]. Based on the aforementioned security gaps of IEC-104, in this paper, we provide a relevant Intrusion Detection System (IDS) which relies on essential access control rules and machine learningbased outlier detection mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…However, SCADA systems are characterised by severe cybersecurity issues since their operation relies on insecure communication protocols that do not comprise any authentication and access control mechanism, thus allowing cyberattacks threatening the confidentiality, integrity and authenticity of the exchanged information. Characteristic examples are Man-in-the-Middle (MiTM) attacks [2], unauthorised access [2] and false data injection attacks. On the other side, the advent and adoption of IoT affect the overall security status of SG.…”
Section: Introductionmentioning
confidence: 99%