12 results on '"Supervisory control systems -- Security measures"'
Search Results
2. Cryptographic integrity for SCADA communications
- Author
-
Govind, Sandeep and Govind, Sandeep
- Subjects
- Supervisory control systems Security measures Mathematical models., Management information systems Security measures Mathematical models., Automatic data collection systems Security measures Mathematical models., Data encryption (Computer science) Mathematical models., Telecommunication Data processing Security measures., Process control Data processing Security measures., Commande supervisée Sécurité Mesures Modèles mathématiques., Systèmes d'information de gestion Sécurité Mesures Modèles mathématiques., Collecte automatique des données Sécurité Mesures Modèles mathématiques., Chiffrement (Informatique) Modèles mathématiques., Télématique Sécurité Mesures., Fabrication Contrôle Informatique Sécurité Mesures.
- Abstract
Supervisory Control and Data Acquisition (SCADA) systems are responsible for automatic control of several critical infrastructures like power grids. An important requirement of SCADA systems is to provide cryptographic protection of its communications. Many key management schemes have been proposed to provide cryptographic protection. But cryptographic modules are seen as more appropriate solution as it provides cryptographic protection of keys. Recently IEEE has proposed a draft standard SCADA cryptographic module (SCM) which provides direct link security. The goal of this research is joint design of a comprehensive key distribution scheme for SCADA systems, and the architecture of simple SCM to support key distribution and mutual authentication of messages exchanged between any two SCADA entities. Furthermore, unlike the IEEE module, our SCM will be transparent to the type of SCADA communication protocol employed, and will not be restricted to the Bump in the Wire (BITW) mode of operation.
- Published
- 2010
3. A retrofit network transaction data logger for SCADA control systems
- Author
-
Pavurapu, Kalyan and Pavurapu, Kalyan
- Subjects
- Data loggers Security measures Computer programs., Data encryption (Computer science) Computer programs., Automatic data collection systems Security measures Computer programs., Supervisory control systems Security measures Computer programs., Enregistreurs de données Sécurité Mesures Logiciels., Chiffrement (Informatique) Logiciels., Collecte automatique des données Sécurité Mesures Logiciels., Commande supervisée Sécurité Mesures Logiciels.
- Abstract
SCADA (Supervisory Control and Data Acquisition) control systems are widely used to control critical processes in various economically and safety critical commercial industries. SCADA control systems are often vulnerable to attacks due to previous industry reliance on security by obscurity to protect control systems. There is a need for an architecture which can log the communications traffic in the SCADA networks. In this work a forensic network traffic data logger retrofit solution for MODBUS and DNP3 network appliances is presented. The data logger uses a bump-in-wire configuration to capture the network transactions, timestamp, cryptographically sign, encrypt and store the network transactions. The data logger is developed to run on embedded and virtual machine platforms. Thus, a retrofit forensic network traffic data logger logs the network traffic in a SCADA control system efficiently without affecting the normal functionality of the control system and the logger data supports post incident forensics analysis.
- Published
- 2010
4. Analysis and Design of Networked Control Systems Under Attacks
- Author
-
Yuan Yuan, Hongjiu Yang, Lei Guo, Fuchun Sun, Yuan Yuan, Hongjiu Yang, Lei Guo, and Fuchun Sun
- Subjects
- Automatic control--Security measures, Supervisory control systems--Security measures
- Abstract
This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive security control of the networked control systems. Because the cyber-physical system is a hybrid system, it adopts cross layer approach to handle the security control of the CPS. It presents a number of attack models according to the attack scenario and defense facilities, and a number of cross-layer co-design methodologies to secure the control of CPS.
- Published
- 2019
5. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
- Author
-
Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt, Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, and Stephen Hilt
- Subjects
- Hacking, Computer security, Automatic control--Security measures, Supervisory control systems--Security measures, Computer crimes--Prevention, Automatic machinery--Security measures
- Abstract
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against attacks that are debilitating—and potentially deadly. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions explains vulnerabilities and attack vectors specific to ICS/SCADA protocols, applications, hardware, servers, and workstations. You will learn how hackers and malware, such as the infamous Stuxnet worm, can exploit them and disrupt critical processes, compromise safety, and bring production to a halt. The authors fully explain defense strategies and offer ready-to-deploy countermeasures. Each chapter features a real-world case study as well as notes, tips, and cautions. Features examples, code samples, and screenshots of ICS/SCADA-specific attacks Offers step-by-step vulnerability assessment and penetration test instruction Written by a team of ICS/SCADA security experts and edited by Hacking Exposed veteran Joel Scambray
- Published
- 2017
6. Emulating Industrial Control System Field Devices Using Gumstix Technology
- Author
-
Berman, Dustin
- Subjects
Emulators ,Supervisory control systems--Security measures ,Programmable controllers--Security measures - Abstract
Industrial Control Systems (ICS) have an inherent lack of security and situational awareness capabilities at the field device level. Yet these systems comprise a significant portion of the nation's critical infrastructure. Currently, there is little insight into the characterization of attacks on ICS. Stuxnet provided an initial look at the type of tactics that can be employed to create physical damage via cyber means. The question still remains, however, as to the extent of malware and attacks that are targeting the critical infrastructure, along with the various methods employed to target systems associated with the ICS environment. This research presents a device using Gumstix technology that emulates an ICS field device. The emulation device is low-cost, adaptable to myriad ICS environments and provides logging capabilities at the field device level. The device was evaluated to ensure conformity to RFC standards and that the operating characteristics are consistent with actual field devices.
- Published
- 2012
7. External Verification of SCADA System Embedded Controller Firmware
- Author
-
McMinn, Lucille R.
- Subjects
Supervisory control systems--Security measures ,Hardware Systems ,Programmable controllers ,Computer firmware - Abstract
Critical infrastructures such as oil and gas pipelines, the electric power grid, and railways, rely on the proper operation of supervisory control and data acquisition (SCADA) systems. Current SCADA systems, however, do not have sufficient tailored electronic security solutions. Solutions available are developed primarily for information technology (IT) systems. Indeed, the toolkit for SCADA incident prevention and response is unavailing as the operating parameters associated with SCADA systems are different from IT systems. The unique environment necessitates tailored solutions. Consider the programmable logic controllers (PLCs) that directly connect to end physical systems for control and monitoring of operating parameters -- the compromise of a PLC could result in devastating physical consequences. Yet PLCs remain particularly vulnerable due to a lack of firmware auditing capabilities. This research presents a tool we developed specifically for the SCADA environment to verify PLC firmware. The tool does not require any modifications to the SCADA system and can be implemented on a variety of systems and platforms. The tool captures serial data during firmware uploads and then verifies them against a known good firmware baseline. Attempts to inject modified and/or malicious firmware are identified by the tool. Additionally, the tool can replay and analyze captured data by emulating a PLC during firmware upload. The emulation capability enables verification of the firmware upload from an interface computer without requiring modifications to or interactions with the operational SCADA system. The ability to isolate the tool from production systems and verify the validity of firmware makes the tool a viable application for SCADA incident response teams and security engineers.
- Published
- 2012
8. Evaluation of Traditional Security Solutions in the SCADA Environment
- Author
-
Larkin, Robert D.
- Subjects
Computer Sciences ,Infrastructure (Economics) ,Fuel ,Supervisory control systems--Security measures ,Computer networks - Abstract
Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric power grid, water treatment facilities, oil and gas pipelines, railways, and other Critical Infrastructure (CI). In recent years, organizations that own and operate these systems have increasingly interconnected them with their enterprise network to take advantage of cost savings and operational benefits. This trend, however, has introduced myriad vulnerabilities associated with the networking environment. As a result, the once isolated systems are now susceptible to a wide range of threats that previously did not exist. To help address the associated risks, security professionals seek to incorporate mitigation solutions designed for traditional networking and Information Technology (IT) systems. Unfortunately, the operating parameters and security principles associated with traditional IT systems do not readily translate to the SCADA environment. Security solutions for IT systems focus primarily on protecting the confidentiality of system and user data. Alternatively, SCADA systems must adhere to strict safety and reliability requirements and rely extensively on system availability. Mitigation strategies designed for traditional IT systems must first be evaluated prior to deployment on a SCADA system or risk adverse operational impacts such as a catastrophic oil spill, poisoning a water supply, or the shutdown of an electrical grid. This research evaluates the suitability of deploying a Host-Based Intrusion Detection System (IDS) to the Department of Defense SCADA fuels system. The impacts of the Host Intrusion Prevention System (HIPS) installed on the SCADA network's Human Machine Interface (HMI) is evaluated. Testing revealed that the HIPS agent interferes with the HMI's system services during startup. Once corrected, the HMI and connected SCADA network inherit the protections of the HIPS security agent and defenses associated with the Host-Based Security System.
- Published
- 2012
9. Techno Security's Guide to Securing SCADA : A Comprehensive Handbook On Protecting The Critical Infrastructure
- Author
-
Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, James H. Windle, Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, and James H. Windle
- Subjects
- Infrastructure (Economics)--Security measures, Automatic data collection systems--Security measures, Supervisory control systems--Security measures
- Abstract
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more Companion Website featuring video interviews with subject matter experts offer a'sit-down'with the leaders in the field
- Published
- 2007
10. Evaluation of Traditional Security Solutions in the SCADA Environment
- Author
-
Larkin, Robert D. and Larkin, Robert D.
11. Emulating Industrial Control System Field Devices Using Gumstix Technology
- Author
-
Berman, Dustin and Berman, Dustin
12. External Verification of SCADA System Embedded Controller Firmware
- Author
-
McMinn, Lucille R. and McMinn, Lucille R.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.