2011
DOI: 10.1007/978-3-642-22706-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Towards Improving SCADA Control Systems Security with Vulnerability Analysis

Abstract: Abstract. Cyber security threats and attacks are greatly affecting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. Despite growing awareness of security issues especially in SCADA networks, there exist little or scarce information about SCADA vulnerabilities and attacks. This research addresses the issues regarding security and performs a vulnerability analysis. Modeling of attack trees was created to simulate the vulner… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Similarly, the list of recently developed SCADA testbed for cyber-security research applications is exhaustive and could not be entirely covered in this section. Few other significant examples include Lu et al [7], Davis [8], Giani et al [9] and Cagalaban et al [10].…”
Section: Recent Developments Of Scada Testbedmentioning
confidence: 99%
“…Similarly, the list of recently developed SCADA testbed for cyber-security research applications is exhaustive and could not be entirely covered in this section. Few other significant examples include Lu et al [7], Davis [8], Giani et al [9] and Cagalaban et al [10].…”
Section: Recent Developments Of Scada Testbedmentioning
confidence: 99%
“…In 2010, [7] stated that since cyber-attacks can destroy critical infrastructures and affect the lives of people, protection mechanisms should be taken to prevent penetrations and intrusions into the ICS network. They also expressed that mitigating the effect of increasing number of vulnerabilities caused by employing ICT services into industrial settings and connecting ICS network to external world, requires to investigate security bugs of industrial applications.…”
Section: Related Workmentioning
confidence: 99%
“…Considering their location (on board of PLCs) it is hardly possible to detect the presence of vulnerabilities in advance, but at the same time being so close to the actuators they can be one of the most dangerous sources of threat. For details about SCADA software vulnerabilities we point to [10].…”
Section: Software Vulnerabilitiesmentioning
confidence: 99%