16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778974
|View full text |Cite
|
Sign up to set email alerts
|

Cyber threats and defence approaches in SCADA systems

Abstract: Abstract-The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. And they are becoming more and more susceptible to cyber-attacks due to utilize standard protocols and increase connectivity. The objective of this paper is to introduce our on-going work and discuss challenges and opportunities for preventing network and application protocol attacks on SCADA systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…This appliance monitors incoming and outgoing packets and allows them to route or drop based on filtering rules using layer three and four on OSI model. [8] An application firewall (or proxy server) is placed between a client application and a server, acting as an intermediary never allowing a direct connection between them. [3] The application firewall adds the capability of examining specific application traffic, such as FTP services, OPC servers or others.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This appliance monitors incoming and outgoing packets and allows them to route or drop based on filtering rules using layer three and four on OSI model. [8] An application firewall (or proxy server) is placed between a client application and a server, acting as an intermediary never allowing a direct connection between them. [3] The application firewall adds the capability of examining specific application traffic, such as FTP services, OPC servers or others.…”
Section: Related Workmentioning
confidence: 99%
“…In [8], the various type of attacks on SCADA systems have been grouped into network protocol and application protocol attacks. In the network protocol attacks, the hacker exploits weak points of network protocols, such as Modbus TCP/IP, that have several serious vulnerabilities [7].…”
Section: Introductionmentioning
confidence: 99%
“…This appliance monitors incoming and outgoing packets and allows them to route or drop based on filtering rules using layer three and four on OSI model. [2] An application firewall (or proxy server) is placed between a client application and a server, acting as an intermediary never allowing a direct connection between them. [9] The application firewall adds the capability of examining specific application traffic, such as FTP services, OPC servers or others.…”
Section: Related Workmentioning
confidence: 99%
“…In [2], the various type of attacks on SCADA systems have been grouped into network protocol and application protocol attacks. In the network protocol attacks, the hacker exploits weak points of network protocols, such as Modbus TCP/IP, that have a number of serious vulnerabilities [3].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the number of cyber incidents is significantly increasing (Kang et al, 2014) which presents novel challenges for both academic researchers and industry experts.…”
Section: Introductionmentioning
confidence: 99%