Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks

John Stranahan, Tapan Soni, Vahid Heydari

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Supervisory Control and Data Acquisition (SCADA) systems have been in use for many years. They are used to remotely monitor and control Industrial Control Systems (ICS) such as gas pipelines, power plants, train systems, and water treatment plants. In recent years, SCADA systems have been targets of malicious cyber-attacks. The standard communication protocol used within many SCADA systems, Modbus TCP/IP, is not secure. In this paper, we conduct cyber-attacks on a pre-implemented SCADA Testbed which uses the Modbus TCP/IP protocol to show the possible effects on real-world SCADA systems.

Original languageEnglish (US)
Title of host publication2019 IEEE SoutheastCon, SoutheastCon 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728101378
DOIs
StatePublished - Apr 2019
Externally publishedYes
Event2019 IEEE SoutheastCon, SoutheastCon 2019 - Huntsville, United States
Duration: Apr 11 2019Apr 14 2019

Publication series

NameConference Proceedings - IEEE SOUTHEASTCON
Volume2019-April
ISSN (Print)1091-0050
ISSN (Electronic)1558-058X

Conference

Conference2019 IEEE SoutheastCon, SoutheastCon 2019
Country/TerritoryUnited States
CityHuntsville
Period4/11/194/14/19

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering
  • Control and Systems Engineering
  • Signal Processing

Fingerprint

Dive into the research topics of 'Supervisory Control and Data Acquisition Testbed Vulnerabilities and Attacks'. Together they form a unique fingerprint.

Cite this