SCADA security: a review and enhancement for DNP3 based systems

作者: Peeyush Jain , Paritosh Tripathi , None

DOI: 10.1007/S40012-013-0024-2

关键词:

摘要: Supervisory control and data acquisition (SCADA) systems are large-scale industrial sys- tems often spread across geographically dispersed locations that let human operators entire physical systems, from a single room. Early multi-site SCADA used closed networks propriety com- munication protocols like Modbus, DNP3 etc to reach remote sites. But with time it has become more convenient cost-effective connect them the Internet. However, internet connections build in new vulnerabilities, as were not designed security mind. This can matter of national if these power plants, water treatment facilities, or other pieces critical infrastructure. Compared IT have higher requirement concerning reliability, latency uptime, so is always feasible apply measures deployed systems. paper provides an overview issues threats networks. Next, attention focused on assessment SCADA. followed by relevant solutions. Finally we propose our solution approach which embedded bump-in-the-wire discussed.

参考文章(25)
Bruno Dutertre, Steven Cheung, Martin Fong, Alfonso Valdes, Ulf Lindqvist, Keith Skinner, Using Model-based Intrusion Detection for SCADA Networks ,(2006)
William Frederick Young, Jason Edwin Stamp, Jennifer Mae Depoy, Common vulnerabilities in critical infrastructure control systems. ,(2003)
CHERYL L BEAVER, DONALD R GALLUP, WILLIAM D NEUMANN, MARK D TORGERSON, Key Management for SCADA Other Information: PBD: 1 Mar 2002. ,(2002) , 10.2172/792866
Bazara I. A. Barry, H. Anthony Chan, A hybrid, stateful and cross-protocol intrusion detection system for converged applications international conference on move to meaningful internet systems. pp. 1616- 1633 ,(2007) , 10.1007/978-3-540-76843-2_35
Robert Dawson, Colin Boyd, Edward Dawson, Juan Gonzalez Nieto, SKMA: a key management architecture for SCADA systems grid computing. pp. 183- 192 ,(2006)
Samuel East, Jonathan Butts, Mauricio Papa, Sujeet Shenoi, A Taxonomy of Attacks on the DNP3 Protocol international conference on critical infrastructure protection. ,vol. 311, pp. 67- 81 ,(2009) , 10.1007/978-3-642-04798-5_5
Jean-Marie Orset, Baptiste Alcalde, Ana Cavalli, An EFSM-Based Intrusion Detection System for Ad Hoc Networks Automated Technology for Verification and Analysis. pp. 400- 413 ,(2005) , 10.1007/11562948_30
Chen-Ching Liu, Alexandru Stefanov, Junho Hong, Patrick Panciatici, Intruders in the Grid IEEE Power & Energy Magazine. ,vol. 10, pp. 58- 66 ,(2012) , 10.1109/MPE.2011.943114
Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera, Modbus/DNP3 State-Based Intrusion Detection System advanced information networking and applications. pp. 729- 736 ,(2010) , 10.1109/AINA.2010.86
Ahmed Patel, Qais Qassim, Christopher Wills, A survey of intrusion detection and prevention systems Information Management & Computer Security. ,vol. 18, pp. 277- 290 ,(2010) , 10.1108/09685221011079199