Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks

John Stranahan, Tapan Soni, Vahid Heydari

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Supervisory Control and Data Acquisition (SCADA) systems have been in use for many years. They are used to remotely monitor and control Industrial Control Systems (ICS) such as gas pipelines, power plants, train systems, and water treatment plants. In recent years, SCADA systems have been targets of malicious cyber-attacks. The standard communication protocol used within many SCADA systems, Modbus TCP/IP, is not secure. In this paper, we conduct cyber-attacks on a pre-implemented SCADA Testbed which uses the Modbus TCP/IP protocol to show the possible effects on real-world SCADA systems.

Original languageEnglish (US)
Title of host publication2019 IEEE SoutheastCon, SoutheastCon 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728101378
DOIs
StatePublished - Apr 2019
Event2019 IEEE SoutheastCon, SoutheastCon 2019 - Huntsville, United States
Duration: Apr 11 2019Apr 14 2019

Publication series

NameConference Proceedings - IEEE SOUTHEASTCON
Volume2019-April
ISSN (Print)0734-7502

Conference

Conference2019 IEEE SoutheastCon, SoutheastCon 2019
CountryUnited States
CityHuntsville
Period4/11/194/14/19

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Signal Processing

Fingerprint Dive into the research topics of 'Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks'. Together they form a unique fingerprint.

Cite this