Exploiting SCADA vulnerabilities using a Human Interface Device
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 7
Abstract
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/technical vulnerabilities or even weaknesses in the defense systems. Even though novel intrusion detection systems are being implemented and used for defending cyber-attacks, certain vulnerabilities of SCADA systems can still be exploited. In this article we present an attack scenario based on a Human Interface Device (HID) device which is used as a means of communication/exploitation tool to compromise SCADA systems. The attack, which is a normal series of commands that are sent from the HID to the PLC cannot be detected through current intrusion detection mechanisms. Finaly we provide possible counter measures and defense mechanisms against this kind of cyber attacks.
Authors and Affiliations
Grigoris Tzokatziou, Helge Janicke, Leandros Maglaras, Ying He
Ontology-based Query Expansion for Arabic Text Retrieval
The semantic resources are important parts in the Information Retrieval (IR) such as search engines, Question Answering (QA), etc., these resources should be available, readable and understandable. In semantic web, the o...
Fitness Proportionate Random Vector Selection based DE Algorithm (FPRVDE)
Differential Evolution (DE) is a simple, powerful and easy to use global optimization algorithm. DE has been studied in detail by many researchers in the past years. In DE algorithm trial vector generation strategies hav...
Effect of Routing Protocols and Layer 2 Mediums on Bandwidth Utilization and Latency
Computer networks (CNS) are progressing as emerging field in information and communication technology (ICT). Various computer networks related problems relies on performance of computer network specifically bandwidth uti...
Conditions Facilitating the Aversion of Unpopular Norms: An Agent-Based Simulation Study
People mostly facilitate and manage their social lives adhering to the prevalent norms. There are some norms which are unpopular, yet people adhere to them. Ironically, people at individual level do not agree to these no...
Resource Provisioning in Single Tier and Multi-Tier Cloud Computing: “State-of-the-Art”
Cloud computing is a new computation trend for delivering information as long as an electronic device needs to access of a web server. One of the major pitfalls in cloud computing is related to optimizing the resource pr...