Scada系统网络攻击分类研究

Aashima Banga, Deepa Gupta, R. Bathla
{"title":"Scada系统网络攻击分类研究","authors":"Aashima Banga, Deepa Gupta, R. Bathla","doi":"10.1109/ICCS45141.2019.9065534","DOIUrl":null,"url":null,"abstract":"SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like-Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.","PeriodicalId":433980,"journal":{"name":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Towards A Taxonomy of Cyber Attacks on Scada System\",\"authors\":\"Aashima Banga, Deepa Gupta, R. Bathla\",\"doi\":\"10.1109/ICCS45141.2019.9065534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like-Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.\",\"PeriodicalId\":433980,\"journal\":{\"name\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Intelligent Computing and Control Systems (ICCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS45141.2019.9065534\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Intelligent Computing and Control Systems (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS45141.2019.9065534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

SCADA(监控和数据采集)系统是用于控制硬件(即plc, pid等)并从设备(即SCADA RTU, RTU)获取数据到计算机系统(即SCADA系统)的软件。它的功能是使用控制系统在远程位置处理我们工厂的工厂操作。这是一个现代工业的现代控制系统,我们可以读取实时数据,这意味着我们可以准确地监控现场发生的事情。我们强调SCADA系统与传统IT系统之间的差异,以及可能保护我们的计算机系统免受网络威胁的安全目标。如果补丁出了问题,它会破坏SCADA系统,后果可能很严重,比如食物被污染、爆炸、严重死亡、停电、严重受伤等。网络物理攻击是在SCADA系统上使用的,例如关闭监视器所在房间的灯或关闭摄像机来对系统进行一些攻击,通过破解密码或破坏防火墙来入侵系统。SCADA的主要目的是远程控制和维护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Towards A Taxonomy of Cyber Attacks on Scada System
SCADA (SUPERVISORY CONTROL AND DATA ACQUISITION) systems are the software that is used to control the hardware i.e. PLCs, PIDs, etc. and acquires the data from the devices (i.e. SCADA RTU, RTU) into a computer system (i.e. SCADA System). Its function is to handle the plant operations in our plant at remote locations using the control system. This is a modern control system of modern industry where we can read real-time data that means we can exactly monitor the things happening in the field. We emphasize on the differences between SCADA systems and traditional IT systems and on pair of security goals that may secure our computer systems from cyber threats. If the patching goes wrong and it bricks the SCADA system, consequences could be severe like-Contaminated food, explosions, severe death, blackouts, severe injury, etc. Cyber-physical attacks are used on the SCADA system such as switching off the lights of the room where the monitor is present or turning off the camera to perform some attack on a system, hacking the system by cracking a password or destroying firewall. The main intention of SCADA is remote controlling and maintenance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信