TY - GEN
T1 - Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks
AU - Stranahan, John
AU - Soni, Tapan
AU - Heydari, Vahid
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/4
Y1 - 2019/4
N2 - Supervisory Control and Data Acquisition (SCADA) systems have been in use for many years. They are used to remotely monitor and control Industrial Control Systems (ICS) such as gas pipelines, power plants, train systems, and water treatment plants. In recent years, SCADA systems have been targets of malicious cyber-attacks. The standard communication protocol used within many SCADA systems, Modbus TCP/IP, is not secure. In this paper, we conduct cyber-attacks on a pre-implemented SCADA Testbed which uses the Modbus TCP/IP protocol to show the possible effects on real-world SCADA systems.
AB - Supervisory Control and Data Acquisition (SCADA) systems have been in use for many years. They are used to remotely monitor and control Industrial Control Systems (ICS) such as gas pipelines, power plants, train systems, and water treatment plants. In recent years, SCADA systems have been targets of malicious cyber-attacks. The standard communication protocol used within many SCADA systems, Modbus TCP/IP, is not secure. In this paper, we conduct cyber-attacks on a pre-implemented SCADA Testbed which uses the Modbus TCP/IP protocol to show the possible effects on real-world SCADA systems.
UR - http://www.scopus.com/inward/record.url?scp=85082387278&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85082387278&partnerID=8YFLogxK
U2 - 10.1109/SoutheastCon42311.2019.9020436
DO - 10.1109/SoutheastCon42311.2019.9020436
M3 - Conference contribution
AN - SCOPUS:85082387278
T3 - Conference Proceedings - IEEE SOUTHEASTCON
BT - 2019 IEEE SoutheastCon, SoutheastCon 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE SoutheastCon, SoutheastCon 2019
Y2 - 11 April 2019 through 14 April 2019
ER -