2017
DOI: 10.1007/978-3-319-72817-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Stealthy Deception Attacks Against SCADA Systems

Abstract: SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta-data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above mentioned anomaly detection. After hijacking the communication channels between the Human Machine Interface (HMI) a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 32 publications
0
19
0
Order By: Relevance
“…Several attack vectors, or a combination of them, can be used to attack an ICS (see Figure 1). For example, an adversary can attack: 1) the HMI machine, by exploiting software vulnerabilities in its OS and application stack, presenting a fake view of the process and causing the operator to issue erroneous commands [21]; 2) the SCADA and/or engineering workstation machine, by exploiting software vulnerabilities and obtaining full control of the ICS, as occurred in the attack in Ukraine [1]; 3) the communication network in the control segment, the remote segment, or between them, by performing eavesdropping, replay, or false packet injection attacks; 4) the PLC, by exploiting software vulnerabilities or trust between the PLC and SCADA -this allows the attacker to change the PLC's logic, influencing the controlled process and causing damage, as in the Stuxnet case; 5) the sensors, by leveraging physical effects, interfering with the measurements, or replacing the sensor with a malicious one, as shown in [22]; 6) the actuators, by altering the signal sent by the actuators to the controlled process, as described in [23]; or, 7) the actuators and communication channels to create a covert channel, as demonstrated in [24]. The threat model assumed in this research considers an adversary whose ultimate goal, regardless of the attack vector, is a physical-level process change.…”
Section: B Attacks On Icss and Threat Modelmentioning
confidence: 99%
“…Several attack vectors, or a combination of them, can be used to attack an ICS (see Figure 1). For example, an adversary can attack: 1) the HMI machine, by exploiting software vulnerabilities in its OS and application stack, presenting a fake view of the process and causing the operator to issue erroneous commands [21]; 2) the SCADA and/or engineering workstation machine, by exploiting software vulnerabilities and obtaining full control of the ICS, as occurred in the attack in Ukraine [1]; 3) the communication network in the control segment, the remote segment, or between them, by performing eavesdropping, replay, or false packet injection attacks; 4) the PLC, by exploiting software vulnerabilities or trust between the PLC and SCADA -this allows the attacker to change the PLC's logic, influencing the controlled process and causing damage, as in the Stuxnet case; 5) the sensors, by leveraging physical effects, interfering with the measurements, or replacing the sensor with a malicious one, as shown in [22]; 6) the actuators, by altering the signal sent by the actuators to the controlled process, as described in [23]; or, 7) the actuators and communication channels to create a covert channel, as demonstrated in [24]. The threat model assumed in this research considers an adversary whose ultimate goal, regardless of the attack vector, is a physical-level process change.…”
Section: B Attacks On Icss and Threat Modelmentioning
confidence: 99%
“…For example, an adversary can attack: 1) The HMI machine, by exploiting software vulnerabilities in its OS and application stack, presenting a fake view of the process and causing the operator to issue erroneous commands [15], 2) The SCADA and/or engineering workstation machine, by exploiting software vulnerabilities and obtaining full control of the ICS, as it happened in Ukraine [1], 3) The communication network in the control segment, in the remote segment, or between them, by performing eavesdropping, or replay or false packet injection attacks, 4) The PLC, by exploiting software vulnerabilities or trust between the PLC and SCADA; this will allow the attacker to change the PLC logic influencing the controlled process and cause damage, as in the Stuxnet case, Fig. 1.…”
Section: B Attacks On Icss and Threat Modelmentioning
confidence: 99%
“…Until 2016, Urbina et al [16,50] stated that existing intrusion detection technology still cannot detect stealthy attacks effectively, so they proposed a new method to measure the negative impacts of stealthy attacks on ICS and tried to limit the negative impacts by configuring detection schemes and metrics properly. Since then, some researchers have conducted further research on stealthy attacks, but they mainly focused on how to perform stealthy attacks on specific ICS [21] or exploring the impacts of stealthy attacks on some more complex systems [22]. As a result, detecting stealthy attacks against ICS becomes an urgent issue.…”
Section: Intrusion Detection Based On Process Data Analysismentioning
confidence: 99%
“…Therefore, the attacker can make the observed behavior of a system follow its expected behavior closely during a stealthy attack, but still inject enough false information into the system after a long period of time [16], and finally cause a fatal damage to the target system. Since then, stealthy attacks against ICS have attracted much attention [21,22]. Previously, we proposed a detection approach against stealthy attacks based on residual permutation entropy [23].…”
Section: Introductionmentioning
confidence: 99%