Exploiting SCADA vulnerabilities using a Human Interface Device

Abstract

SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finaly we provide possible counter measures and defense mechanisms against this kind of cyber attacks.

Authors and Affiliations

Grigoris Tzokatziou, Helge Janicke, Leandros Maglaras, Ying He

Keywords

Related Articles

Ontology-based Query Expansion for Arabic Text Retrieval

The semantic resources are important parts in the Information Retrieval (IR) such as search engines, Question Answering (QA), etc., these resources should be available, readable and understandable. In semantic web, the o...

Fitness Proportionate Random Vector Selection based DE Algorithm (FPRVDE)

Differential Evolution (DE) is a simple, powerful and easy to use global optimization algorithm. DE has been studied in detail by many researchers in the past years. In DE algorithm trial vector generation strategies hav...

Effect of Routing Protocols and Layer 2 Mediums on Bandwidth Utilization and Latency

Computer networks (CNS) are progressing as emerging field in information and communication technology (ICT). Various computer networks related problems relies on performance of computer network specifically bandwidth uti...

Conditions Facilitating the Aversion of Unpopular Norms: An Agent-Based Simulation Study

People mostly facilitate and manage their social lives adhering to the prevalent norms. There are some norms which are unpopular, yet people adhere to them. Ironically, people at individual level do not agree to these no...

Resource Provisioning in Single Tier and Multi-Tier Cloud Computing: “State-of-the-Art”

Cloud computing is a new computation trend for delivering information as long as an electronic device needs to access of a web server. One of the major pitfalls in cloud computing is related to optimizing the resource pr...

Download PDF file
  • EP ID EP148344
  • DOI 10.14569/IJACSA.2015.060731
  • Views 104
  • Downloads 0

How To Cite

Grigoris Tzokatziou, Helge Janicke, Leandros Maglaras, Ying He (2015). Exploiting SCADA vulnerabilities using a Human Interface Device. International Journal of Advanced Computer Science & Applications, 6(7), 234-241. https://europub.co.uk/articles/-A-148344